Method and apparatus for handling custom token propagation without Java serialization
First Claim
1. A computer implemented method for handling propagation of tokens, the method comprising:
- invoking a first login module at a first resource to propagate a token;
assigning identifying information to the token using the first login module; and
performing a customized operation on the token based on the identifying information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus and computer instructions for handling propagation of custom tokens without using Java™ serialization. A service provider may plug in a first login module to add a marker token to a subject for later use by an application at run time. The marker token is then serialized by the mechanism of the present invention by invoking a get bytes method on the token. The present invention then propagates the token downstream if the token is marked forwardable. At a target server, a second login module may be plugged in to deserialize a byte array from a list of tokens and perform custom operation on the byte array retrieved from a token holder.
52 Citations
30 Claims
-
1. A computer implemented method for handling propagation of tokens, the method comprising:
-
invoking a first login module at a first resource to propagate a token;
assigning identifying information to the token using the first login module; and
performing a customized operation on the token based on the identifying information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A data processing system for handling propagation of tokens, the data processing system comprising:
-
invoking means for invoking a first login module at a first resource to propagate a token;
assigning means for assigning identifying information to the token using the first login module; and
performing means for performing a customized operation on the token based on the identifying information. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A computer program product in a computer readable medium for handling propagation of tokens, the computer program product comprising:
-
first instructions for invoking a first login module at a first resource to propagate a token; and
second instructions for assigning identifying information to the token using the first login module;
third instructions for performing a customized operation on the token based on the identifying information. - View Dependent Claims (28, 29, 30)
-
Specification