US 12,463,812 B2
Client authentication and access token ownership validation
Ahmad Muhanna, Richardson, TX (US); and Peter J. McCann, Bridgewater, NJ (US)
Assigned to MAVENIR NETWORKS, INC., Richardson, TX (US)
Filed by MAVENIR NETWORKS, INC., Richardson, TX (US)
Filed on Jul. 26, 2023, as Appl. No. 18/359,043.
Application 18/359,043 is a division of application No. 17/177,793, filed on Feb. 17, 2021, granted, now 11,757,635.
Claims priority of provisional application 62/989,170, filed on Mar. 13, 2020.
Prior Publication US 2023/0370268 A1, Nov. 16, 2023
Int. Cl. H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01)
CPC H04L 9/3213 (2013.01) [H04L 9/083 (2013.01); H04L 9/085 (2013.01); H04L 9/3236 (2013.01); H04L 9/3247 (2013.01); H04L 9/3263 (2013.01)] 8 Claims
OG exemplary drawing
 
1. A method of performing authentication of a client for wireless communication, comprising:
sending, by the client, a request to an authorization server via a proxy node, to obtain an access token, wherein the request to obtain the access token contains a client signature of the client;
authenticating, by the authorization server, the client as a valid recipient of the access token; and
authorizing, by the authorization server, the access token to the client after authenticating the client, wherein the authorization is based on at least the client signature contained in the request to obtain the access token;
wherein the authentication is based on a hash of a combination of the request to obtain the access token and a shared secret key common to the client and the authorization server, and wherein the output of the hash is added to the request to obtain the access token, and wherein the authorization server authenticates the hash by i) hashing the request to obtain the access token and the shared secret key, and ii) comparing the output of the hashing by the authorization server with hash added to the request to obtain the access token received from the client via the proxy node.