Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for providing authorized access to a service application in order to use a protected resource of an end user

A technology for end-user and service applications, used in digital data protection, instrumentation, digital data authentication, etc.

Inactive Publication Date: 2013-12-18
电话有限公司
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] However, none of these solutions have anything to do with the OAuth protocol, ie: the token used for routing is not an OAuth access token

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for providing authorized access to a service application in order to use a protected resource of an end user
  • A method for providing authorized access to a service application in order to use a protected resource of an end user
  • A method for providing authorized access to a service application in order to use a protected resource of an end user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention provides a solution for applying OAuth 1.0 and / or 2.0 to scenarios of highly distributed and potentially changing API publications. Such as image 3 According to the graphical representation of the scenario shown in , the following requirements must be considered:

[0056] - API endpoints (ie, exposed services or resources) are OAuth1.0 or OAuth2.0 compliant and have no knowledge of each other or any global infrastructure.

[0057] -Each API endpoint belongs to a management domain, which is responsible for implementing access control to the local API endpoint. Administrative domains usually correspond to service providers, but a service provider may have multiple administrative domains.

[0058] - Does not have any prior knowledge of API endpoints or admin domains for external applications that must be used by every end user.

[0059] - The point of API exposure and the management domain can change over time.

[0060] First, since the applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for providing authorized access to a service application in order to use a protected resource of an end user. The protected resource, typically an API, is exposed by endpoints of a plurality of administrative domains. The endpoints are previously unknown by said service application and the method further comprises: i. using an intermediate or global entity for: a) selecting one of said administrative domains based on flexible criteria (i.e. at least on the identity of said end user but also considering varying user or service preferences); and b) performing, said selected administrative domain, a secure authorization to grant access to said end user by means of an open protocol; and ii. providing, said selected administrative domain to said service application, once performed said secure authorization, direct or proxy access to said user's protected resource via the endpoint established by said intermediate entity.

Description

technical field [0001] The present invention generally relates to methods of providing service applications with authorized access to use end-user protected resources, typically APIs, exposed by endpoints of a plurality of administrative domains, and the authorized access performed by an OAuth procedure, and more specifically a method comprising using an intermediary entity to route said OAuth procedure to a corresponding administrative domain that is the ultimate issuer and controller of access authorization, and, the The administrative domain provides direct or proxy routes for the end user to access the API. Background technique [0002] Over the past few years, the Internet world has experienced an explosion of web APIs / web services, enabling service providers to open up functionality to other websites and, in many cases, individual developers, enabling them to rapidly build new services or enrich existing services by including and combining remotely exposed functionali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/41G06F21/62
CPCG06F21/41G06F21/6236H04L63/10G06F21/45
Inventor 乔治·洛伦佐大卫·洛扎诺迭戈·冈萨雷斯大卫·韦森特
Owner 电话有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products