Invocation of a third party's service
First Claim
1. A method for invoking a computer implemented service, the method comprising:
- receiving a request from a first user to access a service associated with a second user, the request being associated with a security token for the first user and an identity token for the second user;
determining the acceptability of the security token to authenticate the first user;
determining the acceptability of the identity token to securely identify the second user; and
enabling the first user to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.
9 Assignments
0 Petitions
Accused Products
Abstract
Invoking a computer implemented service includes receiving a request from a first user to access a service associated with a second user. The request is associated with a security token for the first user and an identity token for the second user. The acceptability of the security token is determined to authenticate the first user, and the acceptability of the identity token is determined to securely identify the second user. The first user is able to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.
-
Citations
34 Claims
-
1. A method for invoking a computer implemented service, the method comprising:
-
receiving a request from a first user to access a service associated with a second user, the request being associated with a security token for the first user and an identity token for the second user;
determining the acceptability of the security token to authenticate the first user;
determining the acceptability of the identity token to securely identify the second user; and
enabling the first user to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer system for invoking a computer implemented service, the computer system comprising:
-
a receiver module configured to receive a request from a first user to access a service associated with a second user, the request being associated with a security token for the first user and an identity token for the second user;
a processing module configured to;
determine the acceptability of the security token to authenticate the first user, and determine the acceptability of the identity token to securely identify the second user; and
an access module configured to enable the first user to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.
-
-
34. An apparatus for invoking a computer implemented service, the apparatus comprising:
-
means for receiving a request from a first user to access a service associated with a second user, the request being associated with a security token for the first user and an identity token for the second user;
means for determining the acceptability of the security token to authenticate the first user;
means for determining the acceptability of the identity token to securely identify the second user; and
means for enabling the first user to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.
-
Specification