As the industry increases the use of mobile devices, there is a problem when users work in a mixed environment of desktop machines and mobile devices. There are times that a user is working on his/her desktop machine and needs to continue a browser session on his/her mobile device. The information on the desktop is many times in the form of protected Hypertext Markup Language (HTML) page/document that is being viewed by the desktop browser. The page/document may be secured and protected by an authentication mechanism that was earlier achieved by the user, such as a name and password pair, Kerberos, or Windows® NT Local Area Network (LAN) Manager (NTLM). This means that simply copying the Uniform Resource Locator (URL) link for the document onto another device will not give the user access on that mobile device. In addition, under current approaches in the industry there is no mechanism to transfer (or migrate) the security and Access Control List (ACL) rights associated with the page/document securely and in a trusted manner to a mobile device.
Moreover, session transfer should be done transparently, so that it does not require the user to re-authenticate on the mobile device, which would be perceived as a huge hassle to the user. Both the location of the document and the rights to the document need to be transferred (or accessible) to the mobile device. In addition, there are times when authenticated users entire sessions may need to be transferred from their desktops to their mobile devices. In solving this problem, it is noted that any substantial changes to existing/legacy web services and/or mobile devices are likely not feasible and will likely prevent any significant adoption of device independent session migration techniques. In addition, security is of substantial import, such that unauthorized viewing or modifications to transferred sessions are eliminated. It is also critical that the session migration rights be controlled.
In summary, any technique addressing the portability and migration of a secure session needs to be able to transfer a complete authenticated session with access rights to mobile device in an optimal manner that is as transparent and seamless to the users but also in a manner that is secure and trusted.
Various embodiments of the invention provide techniques for device independent session migration. In an embodiment, a method for session migration is presented.
Specifically, a token is acquired by a device for a session between a resource and a principal that is active on a different device. The token is directly acquired from the different device during the session. Next, the device sends the token to a server session manager. Finally, the session between the resource and the principal is established on or migrated to the device based actions of the server session manager.
A “resource” includes a user, service, system, device, directory, data store, groups of users, combinations and/or collections of these things, etc. A “principal” is a specific type of resource, such as an automated service or user that at one time or another is an actor on another principal or another type of resource. A designation as to what is a resource and what is a principal can change depending upon the context of any given network transaction. Thus, if one resource attempts to access another resource, the actor of the transaction may be viewed as a principal. Resources can acquire and be associated with unique identities to identify unique resources during network transactions.
An “identity” is something that is formulated from one or more identifiers and secrets that provide a statement of roles and/or permissions that the identity has in relation to resources. An “identifier” is information, which may be private and permits an identity to be formed, and some portions of an identifier may be public information, such as a user identifier, name, etc. Some examples of identifiers include social security number (SSN), user identifier and password pair, account number, retina scan, fingerprint, face scan, etc.
A “processing environment” defines a set of cooperating computing resources, such as machines (processor and memory-enabled devices), storage, software libraries, software systems, etc. that form a logical computing infrastructure. A “logical computing infrastructure” means that computing resources can be geographically distributed across a network, such as the Internet. So, one computing resource at network site X and be logically combined with another computing resource at network site Y to form a logical processing environment.
The phrases “processing environment,” “cloud processing environment,” and the term “cloud” may be used interchangeably and synonymously herein.
Moreover, it is noted that a “cloud” refers to a logical and/or physical processing environment as discussed above.
Various embodiments of this invention can be implemented in existing network architectures.
Also, the techniques presented herein are implemented in machines, such as processor or processor-enabled devices (hardware processors). These machines are configured and programmed to specifically perform the processing of the methods and systems presented herein. Moreover, the methods and systems are implemented and reside within a non-transitory computer-readable storage media or machine-readable storage medium and are processed on the machines configured to perform the methods.
Of course, the embodiments of the invention can be implemented in a variety of architectural platforms, devices, operating and server systems, and/or applications. Any particular architectural layout or implementation presented herein is provided for purposes of illustration and comprehension only and is not intended to limit aspects of the invention.
It is within this context that embodiments of the invention are now discussed within the context of the
It is noted that the components and interactions of the
The components of the
John (a user) logins in to his desktop in the morning and begins using his enterprise's Intranet, as he does every day. The enterprise's Intranet is a protected resource and he only has access because he is authenticated. While browsing to the different pages he needs to leave his office and go to a meeting elsewhere but, he is not finished using the Intranet resources; so, he grabs his mobile device (an iPad® in this case) and selects the Mobile Access Snap Shot (MASS) application (previously installed on his iPad®). He, then, points the camera on the iPad® at his desktop's display screen and the next thing he sees is the same browser session that was on his desktop, on his mobile device (seamlessly migrated to his iPad®). He can now continue what he was doing on his desktop using his iPad® as he goes off to his scheduled meeting.
The components and the processing for those components (the
Consider a following specific situation for purposes of illustration.
User Need
The user starts his day by authenticating and accessing protected resources on his enterprise's Intranet via his desktop browser. After some time passes, he needs to go to a meeting but needs to finish up what he was doing on his iPad®.
User Experience
The user selects the MASS application on his iPad®, points the camera of the iPad® toward the desktop screen and now is running the browser on iPad® that is logged-in on the same page the desktop was logged into.
This allows John to continue working on his iPad® as he goes to his meeting. He did not need to type any URL's or passwords, all he did was select an icon and point the camera on his iPad® at the desktop screen to capture a data glyph (such as a Quick Response (QR) code).
Process Flow
Access
1) The user authenticates to a protected enterprise-Intranet service as he normally does, and begin browsing/using protected resources (A-B). As the HTML pages are accessed through a proxy to the browser (B-A), the proxy injects value-added “visible” data into the HTML pages in the form of a data glyph. The data glyph includes information about the URL that is being displayed and an access token that can be used to avow access to the page or session occurring at present on the desktop of the user.
2) The format of the data glyph can be a QR code, and is encoded as an image, which is displayed on the screen. Albeit, it is noted that other implementations or embodiments on this format can be used without departing from the teachings presented herein.
3) When the user wishes to continue the work he/she was doing on his/her desktop, on their mobile device (i.e. an iPad®, smart phone, Android® tablet, etc.), he/she selects the MASS application (installed on the mobile device), points the camera of the mobile device at the desktop screen. (The MASS application uses the camera to read the data glyph (QR coded data) from the desktop screen into the iPad® (D).) The QR data is then decoded, validated, and potentially encrypted, by the iPad® (via the “Mass Application”) and then sent to the “MASS” server (F). The iPad® “MASS” application may also prove its identity (via signing) and/or encrypt the data sent to the MASS server if configured (F).
4) The MASS server validates the access token. The token may have a time to live and scope of access. If required, by policy, the identity of the iPad® device may also be validated. If the URL is in the scope of the access token and all other access policies are met, the MASS server builds a Token for the Proxy. An example is an Open Standard for Authentication (OAuth) token. This token is then sent back to the Mass application (F). The proxy token and the URL(s), the desktop browser was viewing are used to spawn a new browser session on the iPad®. The spawned iPad® browser makes a Hyper Text Transfer Protocol (HTTP) request to proxy with a valid proxy access token included (E).
5) The proxy sends the token to the MASS server to be validated (C). If the token is valid, the browser running on the iPad® is allowed access to the user's enterprise Intranet session.
Device Registration
The above example shows how the users access a system using various components of the invention and assumes that the receiving device (target of session migration or “target device”) is trusted or that no device trust is needed. When the iPad® Mass application sends the access token to the MASS server (step 2 above), the iPad® may be required to validate its device identity to the MASS server to be trusted. The next example shows how the device becomes trusted.
1) In step (2) above, if the iPad® device must be trusted and it is not trusted, the MASS server may respond to the Mass application (F) with a request register the device.
2) The Mass application prompts the user to enter his/her credentials. The Mass application then generates an authentication token. The token can include a Public/Private key pair or a secret key, and device ID.
3) The secret key or the public part of the Public/Private key pair, the device ID, and the user credentials are then sent to the MASS server, via the Mass application, to be validated.
4) If the user credentials are valid, the device is registered and the device can use the private key or secret for other subsequent requests.
Device (iPad) De-Registration
If the user has had a device lost or stolen he/she may de-register the device from any browser application as follows.
1) The user enters the URL of the MASS service (proxy and/or MASS server) into any browser and is presented with a menu of choices. He/she selects a de-register a device option from the menu of choices.
2) If the user is not already authenticated, he/she is prompted for his/her credentials. If the credentials are valid, the MASS server shows a list of devices registered to the user.
3) He/She selects the device and can now choose to “Delete” or “Disable” the device. At this point, the device is no longer able to use the MASS server as a trusted device known to the MASS server.
As discussed above and as discussed in greater detail and specificity below, the teachings herein provide for user simplicity and security during device session migration, such benefits include, but are not limited to:
1) allowing users to transparently transfer a communication and associated work session from one device (original device) to another device (target device).
2) allowing users to present access credentials to a third party—permitting security tokens to be transferred from one screen of an original device to another device without any electronic connection, only visual;
3) using tokens to validate:
4) uses a proxy to add value (data glyph) to existing web services (by injecting the data glyph into their presented views);
5) the token generation is dynamic;
The device session manager provides the processing perspective of an app on a user's device, such as the “Mass App” discussed above from with the
At 210, the device session manager acquires a token for a session between a resource and a principal that is active on a different device from the device that is processing the instance of the device session manager. The token is acquired directly from the different device during the session.
Here, the token is encoded information about the secure and authenticated session between the principal and the resource. The principal can be a user or an automated service. The resource is a remote network-based service or suite of services.
In an embodiment, the session occurs on a desktop computing device and the device session manager is processing as an app on a mobile and portable device of the principal, who is a user.
The token can be acquired in a number of manners.
For example, at 211, the device session manager obtains the token from a display screen of the different device as a Quick Response (QR) code. This scenario was discussed in detail above with reference to the
In an alternative case, at 212, the device session manager obtains the token from one of: a Near Field Communication (NFC) driver, a Bluetooth driver, an Infrared driver, and a Radio Frequency (RF) driver of the different device as wireless encoded information. In this embodiment, the token is not visible to the principal on the different device but the different device can discover or transmit the wireless encoded token such that the device can discover it via one or more wireless technologies. Notice that each of such technologies have a limited geographic range from the different device; this provides security because only a device having the device session manager can recognize the wireless transmission when such device is within that limited geographic range of the different device.
At 220, the device session manager sends the token to a server session manager. This was discussed above with reference to the
According to an embodiment, at 221, the device session manager decodes the token to identify a network address for the server session manager, a resource identifier for the resource, a principal identifier for the principal, and a session identifier for the active session. Armed with this information the device session manager can now communicate with the server session manager to have the session migrated on behalf of the principal from the different device (device having the active session) to the device that is processing the device session manager.
Continuing with the embodiment of 221 and at 222, the device session manager digitally signs and/or encrypts the token by the device and/or the device session manager before sending the token to the server session manager. It is noted that the instance of the device session manager may identify the device, such that the signing occurs via the device session manager but identifies the device. Again, this adds a level of security and trust to the session migration that is taking place by ensuring that the device having the device session manager is known and acquired the token within a configured proximity to the different device where the session is active.
In an embodiment, at 223, the device session manager registers the device with the server session manager when the device is unregistered. That is, the device and the instance of the device session manager processing on the device may not have yet interacted with the server session manager, such that secure registration of that device is needed.
Continuing with the embodiment of 223 and at 224, the device session manager prompts the principal to authenticate with the server session manager to register the device when the device is unregistered. In other words, the principal has to sign into his registered user account to dynamically register the device. The sign in occurs on the device that is being registered.
The scenarios and available security options of 223 and 224 were discussed above with reference to the
At 230, the device session manager establishes the session between the resource and the principal based on actions of the server session manager. That is, the server session manager dynamically and near seamlessly interacts with the resource and/or a proxy of the resource to acquire information that the device session manager can use to re-establish or migrate the session to the device.
According to an embodiment, at 231, the device session manager receives a secure token from the server session manager that is provided to a separate proxy by the device session manager. The separate proxy then uses the secure token to actively migrate the session to the device having the instance of the device session manager.
In an embodiment, at 240, the device session manager is processed on the device, which is a portable and mobile device, such as a tablet, smart phone, and the like.
Continuing with the embodiment of 240 and at 241 the device session manager is acquired as an app that is dynamically downloaded and installed on the portable and mobile device. This can be done via an app store or via any other online vendor/distributor of the device session manager.
In another case, at 250, the device session manager is processed on a device, which is a desktop computing device. So, it may be that the principal (user) is active on a portable device and wants to migrate to his/her desktop device in this embodiment.
The device session manager processes as an independent instance on an original device (discussed with respect to the
It is noted that the target and original devices are relative based on the transaction, such that in some cases as described in the
The server session manager is presented from the perspective of device independent session migration processing occurring on a server and/or proxy. Some of the actions of the server session manager were discussed above with reference to the
At 310, the server session manager injects a token that is discoverable from a first device (original device), which is within a configurable proximity distance to a second device (target device). The token is discovered by the second device during an active session between a principal (user or automated service) and a resource (remote network service or suite of services) occurring on the first device. It is also noted that the resource is unaware of the token and its presence from the session of the first device.
According to an embodiment, at 311, the server session manager customizes the token as a combination of the principal and the resource. So, each combination of a particular principal and a particular resource can have its own unique token or token format (other unique information may be present in the token as well, such as a time element as discussed above with respect to the
In another case, at 312, the server session manager periodically modifies the token based on evaluation of a policy. So, an administrator or automated administrative service can custom define a policy that is dynamically evaluated to determine when the token is modified within an active session. This can be as simple as every so many seconds or minutes or as complex as a series of actions taken during the session in combination with time and other custom-defined factors.
In yet another situation, at 313, the server session manager visually presents the token as a data glyph on a display of the first device to ensure the configured proximity distance of the second device when the second device acquires the token.
In an alternative case, at 314, the server session manager wirelessly communicating the token from the first device to the second device, where a limit to the wireless communication is within the configured proximity distance. This was discussed above with reference to the
At 320, the server session manager acquires the token from the second device (target device). So, the second device was able to acquire the server session manager injected token from the active session on the first device.
Next, at 330, the server session manager validates the token and the second devices. Techniques for achieving this were discussed in detail above with reference to the
At 340, the server session manager interacts with the resource to securely migrate the active session from the first device to the second device. Again, the details for achieving this were presented above with respect to the
According to an embodiment, at 341, the server session manager uses a reverse proxy associated with the resource to securely migrate the active session to the second device.
In an embodiment, at 350, the server session manager permits the active session to be viewed with limited access rights by other principals on other devices based on access rights set by the principal. The other principals, via the other devices, presenting different tokens for viewing access. So, a form of collaboration can be defined by the principal for the session and access rights defined by the principal; in such an embodiment, the other principals may be in proximity to the first device and based on their devices the token acquired is altered to identify the other principals. In other cases, it may be that the other principals receive an electronic communication having the token from the principal. In fact, a variety of techniques can be used to provide the other tokens for collaboration in the session.
In another circumstance, at 360; the server session manager suspends the active session on the first device when the active session is successfully migrated to the second device and then presents a message on a display of the first device indicating that the active session is active on the second device. This may be particular useful to a user that forgets the session is active on another device when he returns back to his original device having the session initially. It may also be that the session occurring on the second device is presented in view only mode on the first device once migrated to the second device. In fact, what occurs on the first device with respect to the session can be dictated by policy defined by the user (principal). Complimentary to the processing at 360, the server session manager can also re-establish any suspended session on the first device by transferring the active session from the second device back to the first device. Again, this complimentary processing may occur with the first embodiment (at 360) discussed above or may occur in place of the first embodiment of the processing 360.
According to an embodiment, the session migration system 400 implements, inter alia, the features of the
The session migration system 400 includes a device session manager 401 and a server session manager 402. Each of these and their interactions with one another will not be discussed in turn.
The session migration system 400 includes a target device having memory configured with device session manager 401. Example processing associated with the device session manager 401 was presented above in detail with reference to the
The device session manager 401 is configured to capture a token within a configured proximity distance from an active session between a principal and a resource occurring on an original device. The device session manager 401 is also configured to communicate that token to the server session manager 402 (as discussed above with respect to the
The session migration system 400 also includes a server having memory configured with server session manager 402. Example processing associated with the server session manager 402 was presented above in detail with reference to the
The server session manager 402 is configured to validate the token and the target device when received from the target device. The server session manager 402 is also configured to interact with the resource to migrate the active session from the original device to the target device (this may be as simple as acquiring a retained security token for the session from a proxy monitoring the resource, such that the resource is completely unaware of the migration and actions of the entities involved).
According to an embodiment, the server session manager 402 is also configured to inject the token into the active session for discovery by the device session manager 401 on the target device within the configured proximity distance.
The above description is illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. The scope of embodiments should therefore be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
This application is a continuation of U.S. patent application Ser. No. 13/663,736, filed Oct. 30, 2012, now issued as U.S. Pat. No. 9,277,017, which is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
6615264 | Stoltz et al. | Sep 2003 | B1 |
6877111 | Sharma et al. | Apr 2005 | B2 |
7502824 | Kaluskar et al. | Mar 2009 | B2 |
7552218 | Kaluskar et al. | Jun 2009 | B2 |
7587400 | Bastawala et al. | Sep 2009 | B2 |
7646755 | Kurlander et al. | Jan 2010 | B2 |
8032589 | Foti | Oct 2011 | B2 |
8116685 | Bregman-amital et al. | Feb 2012 | B2 |
8166176 | Kumar et al. | Apr 2012 | B2 |
8181226 | Lohr | May 2012 | B2 |
8228861 | Nix | Jul 2012 | B1 |
8234236 | Beaty et al. | Jul 2012 | B2 |
8255690 | Wiseman et al. | Aug 2012 | B2 |
8392580 | Allen | Mar 2013 | B2 |
8549151 | Stokking | Oct 2013 | B2 |
8738699 | Hovdal et al. | May 2014 | B2 |
8943582 | Zhou | Jan 2015 | B1 |
9143936 | Kim | Sep 2015 | B2 |
9219762 | Burch | Dec 2015 | B2 |
9277017 | Burch et al. | Mar 2016 | B2 |
9479345 | Krishnakumar | Oct 2016 | B2 |
9973543 | Chitroda | May 2018 | B2 |
10142374 | Chang | Nov 2018 | B2 |
20030055977 | Miller | Mar 2003 | A1 |
20040068567 | Moran | Apr 2004 | A1 |
20050038828 | Kaluskar et al. | Feb 2005 | A1 |
20060120287 | Foti | Jun 2006 | A1 |
20070094490 | Lohr | Apr 2007 | A1 |
20080059639 | Zhang | Mar 2008 | A1 |
20080084867 | Foti et al. | Apr 2008 | A1 |
20090210536 | Allen | Aug 2009 | A1 |
20090259758 | Chen et al. | Oct 2009 | A1 |
20100268828 | Pahlavan et al. | Oct 2010 | A1 |
20100306542 | Funk | Dec 2010 | A1 |
20110023096 | Xiao et al. | Jan 2011 | A1 |
20110029999 | Foti | Feb 2011 | A1 |
20110153854 | Chickering | Jun 2011 | A1 |
20110231784 | Meng et al. | Sep 2011 | A1 |
20110231923 | Bollay et al. | Sep 2011 | A1 |
20120023167 | Hovdal et al. | Jan 2012 | A1 |
20120066373 | Ochoa et al. | Mar 2012 | A1 |
20120198531 | Ort et al. | Aug 2012 | A1 |
20120201361 | Angel et al. | Aug 2012 | A1 |
20130110666 | Aubrey | May 2013 | A1 |
20130290494 | Goudarzi et al. | Oct 2013 | A1 |
20130314491 | Vivekanandan et al. | Nov 2013 | A1 |
20130318249 | Mcdonough et al. | Nov 2013 | A1 |
20140059344 | Branton et al. | Feb 2014 | A1 |
20140113556 | Kotecha | Apr 2014 | A1 |
20140122730 | Burch et al. | May 2014 | A1 |
20140122731 | Burch et al. | May 2014 | A1 |
20140156854 | Gaetano, Jr. | Jun 2014 | A1 |
20140173125 | Selvanandan | Jun 2014 | A1 |
20140359709 | Nassar | Dec 2014 | A1 |
20160050160 | Li | Feb 2016 | A1 |
20160205149 | Burch | Jul 2016 | A1 |
20180191831 | Wadley | Jul 2018 | A1 |
Entry |
---|
U.S. Appl. No. 13/663,736, filed Oct. 30, 2012, Techniques for Device Independent Session Migration. |
Number | Date | Country | |
---|---|---|---|
20160205149 A1 | Jul 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13663736 | Oct 2012 | US |
Child | 15056325 | US |