US 11,736,469 B2
Single sign-on enabled OAuth token
Mayank Maria, Bangalore (IN); Aarathi Balakrishnan, Bangalore (IN); Dharmvir Singh, Bangalore (IN); Madhu Martin, Bangalore (IN); Vikas Pooven Chathoth, Bangalore (IN); and Vamsi Motukuru, Monmouth Junction, NJ (US)
Assigned to Oracle International Corporation, Redwood Shores, CA (US)
Filed by Oracle International Corporation, Redwood Shores, CA (US)
Filed on Mar. 2, 2022, as Appl. No. 17/684,949.
Application 17/684,949 is a continuation of application No. 16/164,709, filed on Oct. 18, 2018, granted, now 11,303,627.
Claims priority of provisional application 62/678,895, filed on May 31, 2018.
Prior Publication US 2022/0191188 A1, Jun. 16, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/00 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/0815 (2013.01) [H04L 63/0853 (2013.01); H04L 63/108 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
receiving, by an application, from an access management system, a user identity token, the user identity token including information identifying a user and a session identifier associated with a Single Sign-On (SSO) session;
storing, by the application, the user identity token;
sending, by the application, to the access management system, an access token request, the access token request including the session identifier associated with the SSO session, wherein the access management system retrieves session information associated with the SSO session based on the session identifier, and determines that the SSO session is valid based on the session information, wherein the access management system determines the SSO session is valid by determining a session expiration time based on the session information, by determining that the session expiration time has not yet been reached, by determining a timeout duration based on the session information, and by determining that the SSO session has not timed out based upon the timeout duration;
receiving, by the application, from the access management system, if the SSO session is valid, an access token that enables the application to access to a protected resource, the access token being different from the user identity token; and
using, by the application, the access token to access the protected resource.