Method and apparatus for converting authentication-tokens to facilitate interactions between applications
First Claim
1. A method for converting authentication-tokens, comprising:
- receiving a command-execution request from a first application, wherein the command-execution request specifies a command to be executed by a second application;
verifying a first authentication-token included with the command-execution request;
translating the first authentication-token to a form associated with the second application to produce a second authentication-token;
modifying the command-execution request by replacing the first authentication-token with the second authentication-token to create a modified command-execution request; and
sending the modified command-execution request to the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides a system that converts authentication-tokens to facilitate interactions between applications. During operation, the system receives a command-execution request from a first application, wherein the command-execution request specifies a command to execute on a second application. Subsequently, the system verifies a first authentication-token included with the command-execution request. Next, the system translates the first authentication-token into a form associated with the second application to produce a second authentication-token. The system then modifies the command-execution request by replacing the first authentication-token with the second-authentication-token to create a modified command-execution request. Then, the system sends the modified command-execution request to the second application.
87 Citations
26 Claims
-
1. A method for converting authentication-tokens, comprising:
-
receiving a command-execution request from a first application, wherein the command-execution request specifies a command to be executed by a second application; verifying a first authentication-token included with the command-execution request; translating the first authentication-token to a form associated with the second application to produce a second authentication-token; modifying the command-execution request by replacing the first authentication-token with the second authentication-token to create a modified command-execution request; and sending the modified command-execution request to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method for converting authentication-tokens, the method comprising:
-
receiving a command-execution request from a first application, wherein the command-execution request specifies a command to be executed by a second application; verifying a first authentication-token included with the command-execution request; translating the first authentication-token to a form associated with the second application to produce a second authentication-token; modifying the command-execution request by replacing the first authentication-token with the second authentication-token to create a modified command-execution request; and sending the modified command-execution request to the second application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An apparatus that converts authentication-tokens, comprising:
-
a receiving mechanism configured to receive a command-execution request from a first application, wherein the command-execution request specifies a command to be executed by a second application; a verification mechanism configured to verify a first authentication-token included with the command-execution request; a translation mechanism configured to translate the first authentication-token to a form associated with the second application to produce a second authentication-token; a modification mechanism configured to modify the command-execution request by replacing the first authentication-token with the second authentication-token to create a modified command-execution request; and a sending mechanism configured to send the modified command-execution request to the second application. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification