SECURING AUTHORIZATION TOKENS USING CLIENT INSTANCE SPECIFIC SECRETS

    公开(公告)号:US20180367306A1

    公开(公告)日:2018-12-20

    申请号:US15622834

    申请日:2017-06-14

    Applicant: eBay Inc.

    Abstract: A system, method, and computer program product are provided for securing authorization tokens using client instance specific secrets. Tokens are valid for service requests only if time constraints and additional security constraints are met by additional information stored in the token in hashed form. A required comparison of a timestamp in a client service request header to the current server time limits the useful token life, e.g., to a few minutes. The service request header also includes data generated based on a secret previously assigned to a specific client instance. The secret may be generated by the server according to a public/private key scheme and sent to a particular client instance only once, e.g., during initial device registration. The secret may be omitted from service requests for public information. Service request headers may include device identifiers, so that service requests from known rogue clients may be ignored.

    Securing authorization tokens using client instance specific secrets

    公开(公告)号:US10972273B2

    公开(公告)日:2021-04-06

    申请号:US15622834

    申请日:2017-06-14

    Applicant: eBay Inc.

    Abstract: A system, method, and computer program product are provided for securing authorization tokens using client instance specific secrets. Tokens are valid for service requests only if time constraints and additional security constraints are met by additional information stored in the token in hashed form. A required comparison of a timestamp in a client service request header to the current server time limits the useful token life, e.g., to a few minutes. The service request header also includes data generated based on a secret previously assigned to a specific client instance. The secret may be generated by the server according to a public/private key scheme and sent to a particular client instance only once, e.g., during initial device registration. The secret may be omitted from service requests for public information. Service request headers may include device identifiers, so that service requests from known rogue clients may be ignored.

    Secure token refresh
    3.
    发明授权

    公开(公告)号:US11463258B2

    公开(公告)日:2022-10-04

    申请号:US16818312

    申请日:2020-03-13

    Applicant: eBay Inc.

    Abstract: Technologies are shown for secure token refresh where a client receives a first access token from an authentication service, generates an asymmetric key pair, stores the first access token in association with a private key, and sends a public key to the authentication service. The service stores the public key in association with the first access token. The client sends a refresh token request to the service with the first access token. The service responds with a verification request with proof data. The client signs the proof data with the private key and sends the signed proof data to the service. The service verifies the signed proof data using the public key associated with the first access token, creates a second access token that is stored in association with the public key, and sends the second access token to the client, which stores it in association with the private key.

    Secure token refresh
    4.
    发明授权

    公开(公告)号:US11824992B2

    公开(公告)日:2023-11-21

    申请号:US17895305

    申请日:2022-08-25

    Applicant: eBay Inc.

    Abstract: Technologies are shown for secure token refresh where a client receives a first access token from an authentication service, generates an asymmetric key pair, stores the first access token in association with a private key, and sends a public key to the authentication service. The service stores the public key in association with the first access token. The client sends a refresh token request to the service with the first access token. The service responds with a verification request with proof data. The client signs the proof data with the private key and sends the signed proof data to the service. The service verifies the signed proof data using the public key associated with the first access token, creates a second access token that is stored in association with the public key, and sends the second access token to the client, which stores it in association with the private key.

Patent Agency Ranking