News Column

"Single Sign-On for Network Applications" in Patent Application Approval Process

June 5, 2014



By a News Reporter-Staff News Editor at Politics & Government Week -- A patent application by the inventors CHICKERING, Roger A. (Granite Bay, CA); Funk, Paul (Cambridge, MA), filed on January 6, 2014, was made available online on May 22, 2014, according to news reporting originating from Washington, D.C., by VerticalNews correspondents.

This patent application is assigned to Juniper Networks, Inc.

The following quote was obtained by the news editors from the background information supplied by the inventors: "More and more organizations are implementing networks in which users authenticate to a server on the network before acquiring access to network services. Once users have access to network services, users may use that access to use network-based applications such as intranets, web-based email, web-based word processors, database services, document management services, content management services, etc. These network-based applications may restrict access to authorized users, and, in this case, will verify the identity of authorized users."

In addition to the background information obtained for this patent application, VerticalNews journalists also obtained the inventors' summary information for this patent application: "A method may include authenticating a device to a first server, where the device includes an agent; receiving a request, in the first server from a second server, to verify the authenticity of the device, where the device is not authenticated to the second server; sending a browser plug-in to the device to communicate with the agent for verifying the authenticity of the device; receiving, in the first server, a message from the agent verifying the authenticity of the device; and sending a message from the first server to the second server to authenticate the device to the second server.

"A network device may include a processor to authenticate a user device to the network device, where the user device includes an agent; a receiver to receive a request from a server to authenticate the user device, where the user device is not authenticated to the server; and a transmitter to sent a browser plug-in to the user device to communicate with the agent for verifying the authenticity of the user device with the network device; where the receiver receives a message from the agent verifying the authenticity of the user device; and where the transmitter sends a message from the network device to the server to authenticate the user device to the server.

"An apparatus may include means for authenticating a device to a first server, where the device includes an agent; means for receiving a request, in the first server from a second server, to verify the authenticity of the device, where the device is not authenticated to the second server; means for sending executable code to the device to communicate with the agent for verifying the authenticity of the device; means for receiving, in the first server, a message from the agent verifying the authenticity of the device; and means for sending a message from the first server to the second server to authenticate the device to the second server.

BRIEF DESCRIPTION OF THE DRAWINGS

"The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate one or more embodiments described herein and, together with the description, explain these embodiments. In the drawings:

"FIG. 1 is a block diagram of an exemplary environment in which systems and methods described herein may be implemented;

"FIG. 2 is a block diagram of exemplary components of a user device;

"FIG. 3 is a block diagram of exemplary components of a server computing module;

"FIG. 4 is a block diagram of an exemplary session table;

"FIGS. 5A, 5B, and 5C are block diagrams of an exemplary token table;

"FIG. 6 is a flowchart of an exemplary process for verifying the authenticity of a user device;

"FIG. 7 is a signal diagram of exemplary signals that may be sent between an application server, a user device, and a policy server;

"FIG. 8 is a flowchart of another exemplary process for verifying the authenticity of a user device; and

"FIG. 9 is a signal diagram of exemplary signals that may be sent between an application server, a user device, and a policy server."

URL and more information on this patent application, see: CHICKERING, Roger A.; Funk, Paul. Single Sign-On for Network Applications. Filed January 6, 2014 and posted May 22, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=79&p=2&f=G&l=50&d=PG01&S1=20140515.PD.&OS=PD/20140515&RS=PD/20140515

Keywords for this news article include: Network Services, Juniper Networks Inc..

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Politics & Government Week


Story Tools






HispanicBusiness.com Facebook Linkedin Twitter RSS Feed Email Alerts & Newsletters