×

User device security manager

  • US 9,230,089 B2
  • Filed: 12/10/2012
  • Issued: 01/05/2016
  • Est. Priority Date: 07/16/2012
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus comprising:

  • an identification module comprising one or more hardware processors and configured to identify an access request issued from an application to access remote resources associated with a web service, the application being configured to execute at a user device and being separate from the user device security manager;

    an artifact module configured to retrieve at least one user artifact from a security manager identifier (SMID) received from the web service;

    a processor-implemented verification module to perform fingerprinting of the user device based on the at least one user artifact;

    an acquisition module configured to acquire security information associated with the application, the security information including an application identification and at least an access scope for the application to access the remote resources or a nonce for the application, the acquisition of the security information being performed in response to the access request being identified; and

    a communication module configured toissue an authentication request to the web service based on the access request to access the remote resources associated with the web service, the authentication request comprising the security information including the application identification and at least the access scope for the application to access the remote resources or the nonce for the application,transmit the authentication request to the web service for authentication of the application by the web service based on the security information associated with the application, andin response to the authentication request including the security information being transmitted, receiving an indication from the web service that the application is authenticated by the web service based on the security information including the application identification and at least the access scope for the application to access the remote resources or the nonce for the application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×