IN2013CH05960A - - Google Patents
Download PDFInfo
- Publication number
- IN2013CH05960A IN2013CH05960A IN5960CH2013A IN2013CH05960A IN 2013CH05960 A IN2013CH05960 A IN 2013CH05960A IN 5960CH2013 A IN5960CH2013 A IN 5960CH2013A IN 2013CH05960 A IN2013CH05960 A IN 2013CH05960A
- Authority
- IN
- India
- Prior art keywords
- client application
- redirect
- resource
- request
- method includes
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
Embodiments herein provide a method and system for authenticating a client application attempting to access a protected resource on a resource server. The method includes receiving a request to access the protected resource at an authorization server. The request is received from the client application authorized by a resource owner of the protected resource. Further, the method includes redirecting the request to the resource server using a redirect identifier corresponding to a redirect endpoint of the client application. The redirect identifier is intercepted by a web run time engine prior to the redirect. Furthermore, the method includes determining a match between the intercepted redirect identifier and a pre-assigned redirect identifier with the client application stored at the web run time engine to authenticate the client application prior to providing access to the protected resource. FIG. 3
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN5960CH2013 IN2013CH05960A (en) | 2013-12-20 | 2013-12-20 | |
| US14/578,090 US10554643B2 (en) | 2013-12-20 | 2014-12-19 | Method and system to provide additional security mechanism for packaged web applications |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN5960CH2013 IN2013CH05960A (en) | 2013-12-20 | 2013-12-20 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| IN2013CH05960A true IN2013CH05960A (en) | 2015-06-26 |
Family
ID=53401391
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| IN5960CH2013 IN2013CH05960A (en) | 2013-12-20 | 2013-12-20 |
Country Status (2)
| Country | Link |
|---|---|
| US (1) | US10554643B2 (en) |
| IN (1) | IN2013CH05960A (en) |
Families Citing this family (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| IN2013CH05960A (en) * | 2013-12-20 | 2015-06-26 | Samsung R & D Inst India Bangalore Private Ltd | |
| WO2015168305A1 (en) | 2014-04-29 | 2015-11-05 | Twitter, Inc. | Inter-application delegated authentication |
| US20180091490A1 (en) * | 2016-09-23 | 2018-03-29 | Apple Inc. | Authentication framework for a client of a remote database |
| CN108234400B (en) * | 2016-12-15 | 2021-01-22 | 北京金山云网络技术有限公司 | A method, device and situational awareness system for determining attack behavior |
| US10454672B2 (en) * | 2017-05-25 | 2019-10-22 | Facebook, Inc. | Systems and methods for preventing session fixation over a domain portal |
| US10838739B2 (en) | 2018-04-19 | 2020-11-17 | Circle Media Labs Inc. | Network-connected computing devices and methods for executing operating programs in RAM memory |
| US11190514B2 (en) * | 2019-06-17 | 2021-11-30 | Microsoft Technology Licensing, Llc | Client-server security enhancement using information accessed from access tokens |
| DE102020116791B4 (en) | 2020-06-25 | 2025-09-11 | Technische Universität Dresden | Device and method for computer-aided processing of data |
Family Cites Families (46)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1999066385A2 (en) * | 1998-06-19 | 1999-12-23 | Sun Microsystems, Inc. | Scalable proxy servers with plug in filters |
| EP1244262B1 (en) * | 2001-03-23 | 2005-05-11 | Sun Microsystems, Inc. | Redirection of client requests |
| US7516460B2 (en) * | 2003-02-28 | 2009-04-07 | Microsoft Corporation | System and method for creating a runtime connection interface for attributes and element tags defined within a subclass in a markup document |
| US8590032B2 (en) * | 2003-12-10 | 2013-11-19 | Aventail Llc | Rule-based routing to resources through a network |
| US8700729B2 (en) * | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
| US20070180225A1 (en) * | 2005-02-24 | 2007-08-02 | Schmidt Jeffrey A | Method and system for performing authentication and traffic control in a certificate-capable session |
| US20070088611A1 (en) * | 2005-05-11 | 2007-04-19 | Christiansen Brian D | Effecting ancillary actions on a transaction network |
| US20080114678A1 (en) * | 2006-11-15 | 2008-05-15 | David Lawrence Bennett | Method and apparatus for remote authorization |
| US20100050243A1 (en) * | 2006-12-04 | 2010-02-25 | Sxip Identify Corp. | Method and system for trusted client bootstrapping |
| US8533283B2 (en) * | 2007-05-03 | 2013-09-10 | Gary Stephen Shuster | Redirection method for electronic content |
| US9003488B2 (en) * | 2007-06-06 | 2015-04-07 | Datavalet Technologies | System and method for remote device recognition at public hotspots |
| US20090328208A1 (en) * | 2008-06-30 | 2009-12-31 | International Business Machines | Method and apparatus for preventing phishing attacks |
| US20090328142A1 (en) * | 2008-06-30 | 2009-12-31 | Industrial Technology Research Institute | Systems and Methods for Webpage Verification Using Data-Hiding Technology |
| US10270602B2 (en) * | 2008-10-01 | 2019-04-23 | International Business Machines Corporation | Verifying and enforcing certificate use |
| US9282097B2 (en) * | 2010-05-07 | 2016-03-08 | Citrix Systems, Inc. | Systems and methods for providing single sign on access to enterprise SAAS and cloud hosted applications |
| JP5795848B2 (en) * | 2010-09-22 | 2015-10-14 | キヤノン株式会社 | Information processing apparatus, control method thereof, and program |
| US8868915B2 (en) * | 2010-12-06 | 2014-10-21 | Verizon Patent And Licensing Inc. | Secure authentication for client application access to protected resources |
| US9225532B2 (en) * | 2010-12-06 | 2015-12-29 | Verizon Patent And Licensing Inc. | Method and system for providing registration of an application instance |
| US9165134B2 (en) * | 2011-03-08 | 2015-10-20 | Telefonica, S.A. | Method for providing authorized access to a service application in order to use a protected resource of an end user |
| US8863248B2 (en) * | 2011-04-07 | 2014-10-14 | International Business Machines Corporation | Method and apparatus to auto-login to a browser application launched from an authenticated client application |
| US9116717B2 (en) * | 2011-05-27 | 2015-08-25 | Cylance Inc. | Run-time interception of software methods |
| KR101978180B1 (en) * | 2011-06-09 | 2019-05-14 | 삼성전자주식회사 | Method and system for controlling user experience with an application on a client device |
| WO2013018028A2 (en) * | 2011-08-04 | 2013-02-07 | International Business Machines Corporation | Authentication policy enforcement |
| US9043886B2 (en) * | 2011-09-29 | 2015-05-26 | Oracle International Corporation | Relying party platform/framework for access management infrastructures |
| US9699170B2 (en) * | 2011-09-29 | 2017-07-04 | Oracle International Corporation | Bundled authorization requests |
| EP2575315A1 (en) * | 2011-09-30 | 2013-04-03 | British Telecommunications Public Limited Company | Controlled access |
| CN103067338B (en) * | 2011-10-20 | 2017-04-19 | 上海贝尔股份有限公司 | Third party application centralized safety management method and system and corresponding communication system |
| DE102012008395A1 (en) * | 2012-04-27 | 2013-10-31 | Lock Your World Gmbh & Co. Kg | Method and system for secure key handover |
| JP6006533B2 (en) * | 2012-05-25 | 2016-10-12 | キヤノン株式会社 | Authorization server and client device, server linkage system, and token management method |
| US9009787B2 (en) * | 2012-07-25 | 2015-04-14 | Oracle International Corporation | System and method of mapping and protecting communication services with OAuth |
| US8806595B2 (en) * | 2012-07-25 | 2014-08-12 | Oracle International Corporation | System and method of securing sharing of resources which require consent of multiple resource owners using group URI's |
| US8782411B2 (en) * | 2012-07-25 | 2014-07-15 | Oracle International Corporation | System and method of extending oauth server(s) with third party authentication/authorization |
| US8925050B2 (en) * | 2012-10-29 | 2014-12-30 | Oracle International Corporation | Communication between authentication plug-ins of a single-point authentication manager and client systems |
| US8484711B1 (en) * | 2012-10-31 | 2013-07-09 | Fmr Llc | System and method for providing access to a software application |
| US9038142B2 (en) * | 2013-02-05 | 2015-05-19 | Google Inc. | Authorization flow initiation using short-term wireless communication |
| US9104848B2 (en) * | 2013-05-08 | 2015-08-11 | International Business Machines Corporation | Cross-platform authentication from within a rich client |
| US9723058B2 (en) * | 2013-05-28 | 2017-08-01 | Vmware, Inc. | Dynamic registration of an application with an enterprise system |
| JP6198477B2 (en) * | 2013-06-21 | 2017-09-20 | キヤノン株式会社 | Authority transfer system, authorization server system, control method, and program |
| JP6166596B2 (en) * | 2013-06-21 | 2017-07-19 | キヤノン株式会社 | Authorization server system, control method therefor, and program |
| US9160731B2 (en) * | 2013-09-06 | 2015-10-13 | International Business Machines Corporation | Establishing a trust relationship between two product systems |
| US9497180B2 (en) * | 2013-10-21 | 2016-11-15 | Intel IP Corporation | Content access authentication for dynamic adaptive streaming over hypertext transfer protocol |
| US9001370B1 (en) * | 2013-11-15 | 2015-04-07 | Ricoh Company, Ltd. | Card authentication for OAuth supported cloud services on a multi-function device |
| IN2013CH05960A (en) * | 2013-12-20 | 2015-06-26 | Samsung R & D Inst India Bangalore Private Ltd | |
| US20160044023A1 (en) * | 2014-01-30 | 2016-02-11 | Globalfoundries Inc. | Authentication policy enforcement |
| US9300656B2 (en) * | 2014-08-21 | 2016-03-29 | International Business Machines Corporation | Secure connection certificate verification |
| US20170026186A1 (en) * | 2015-07-26 | 2017-01-26 | Fortinet, Inc. | Detection of fraudulent digital certificates |
-
2013
- 2013-12-20 IN IN5960CH2013 patent/IN2013CH05960A/en unknown
-
2014
- 2014-12-19 US US14/578,090 patent/US10554643B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US10554643B2 (en) | 2020-02-04 |
| US20150180850A1 (en) | 2015-06-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IN2013CH05960A (en) | ||
| EP4271016A3 (en) | Enhanced authentication based on secondary device interactions | |
| AU2018337040A1 (en) | Systems and methods for time-based one-time password management for a medical device | |
| MX383704B (en) | METHOD, DEVICE, SERVER AND SYSTEM FOR AUTHENTICATING A USER. | |
| WO2014047385A3 (en) | Subscription-notification mechanisms for synchronization of distributed states | |
| WO2013106688A3 (en) | Authenticating cloud computing enabling secure services | |
| WO2015162072A3 (en) | Instant messaging systems and methods | |
| WO2012096791A3 (en) | Methods and systems for distributing cryptographic data to authenticated recipients | |
| WO2014047384A3 (en) | Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers | |
| GB2464552B (en) | Authentication system and method for authenticating a user terminal with an access node providing restricted access to a communication network | |
| MY208966A (en) | Network security management method, apparatus, and network security management system | |
| GB2531677A (en) | A network security system | |
| MX2016000228A (en) | Third-party captive portal. | |
| WO2011043903A3 (en) | Network access control | |
| IN2014MN01517A (en) | ||
| MX390158B (en) | METHOD AND DEVICE FOR DETERMINING A CONTROL AUTHORITY ON A USER DEVICE. | |
| GB2525361A (en) | User authentication | |
| WO2010060704A3 (en) | Method and system for token-based authentication | |
| MX2016014461A (en) | Provisioning drm credentials on a client device using an update server. | |
| GB2526743A (en) | Session attribute propagation through secure database server tiers | |
| WO2015057937A8 (en) | Method and system for implementing video two factor authentication | |
| GB201107670D0 (en) | Thick client and thin client integration | |
| MX2015015140A (en) | User authentication. | |
| MY184704A (en) | A system and method for authenticating a user based on user behaviour and environmental factors | |
| WO2014182858A3 (en) | Authorization of media content transfer between home media server and client device |