SECURITY PROXYING FOR END-USER APPLICATIONS
First Claim
1. In an end-user application, a method comprising:
- receiving input from an interface, the input soliciting an operation of the end-user application;
sending to a security proxy a request for a service of a backend server that provides the solicited operation, the request having insufficient security information to access the requested service, the request to cause the security proxy to inject authentication information into the request for the service of the backend server and forward the request to the backend server;
receiving a response from the backend server that includes data related to the solicited operation, based on the authentication information injected by the security proxy; and
providing a representation of the received data in the interface.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses enable a service mediator to provide security proxying services to an end-user application requesting a backend service of an enterprise network. The end-user application generates a request for a service of the backend system. The request does not have sufficient security information to enable access to the backend system. The service mediator can detect that one or more items of required security information are not present in the request and injects the necessary security information into the request. The end-user application need not even have access to the security information or even be aware that security information is needed to access the service. The request having the required security information is sent to the backend to enable access to the backend service.
-
Citations
24 Claims
-
1. In an end-user application, a method comprising:
-
receiving input from an interface, the input soliciting an operation of the end-user application; sending to a security proxy a request for a service of a backend server that provides the solicited operation, the request having insufficient security information to access the requested service, the request to cause the security proxy to inject authentication information into the request for the service of the backend server and forward the request to the backend server; receiving a response from the backend server that includes data related to the solicited operation, based on the authentication information injected by the security proxy; and providing a representation of the received data in the interface. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An article of manufacture comprising a machine readable medium having content stored thereon to provide instructions that cause a machine to perform operations including:
-
receiving input from an interface, the input soliciting an operation of the end-user application; sending to a security proxy a request for a service of a backend server that provides the solicited operation, the request having insufficient security information to access the requested service, the request to cause the security proxy to inject authentication information into the request for the service of the backend server and forward the request to the backend server; receiving a response from the backend server that includes data related to the solicited operation, based on the authentication information injected by the security proxy; and providing a representation of the received data in the interface. - View Dependent Claims (7, 8)
-
-
9. In a service mediator that provides services to an end-user application, a method comprising:
-
receiving from an end-user application a request for a service of a backend server; determining that the request for the service requires security information; determining that the request from the end-user application does not include the required security information; injecting the required security information into the request; and forwarding the request for the service to the backend server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An article of manufacture comprising a machine readable medium having content stored thereon to provide instructions that cause a machine to perform operations including:
-
receiving from an end-user application a request for a service of a backend server; determining that the request for the service requires security information; determining that the request from the end-user application does not include the required security information; injecting the required security information into the request; and forwarding the request for the service to the backend server. - View Dependent Claims (19, 20)
-
-
21. A system comprising:
-
an end-user application operating out of memory, the end-user application to generate a request for a backend service, the request lacking security information required to access the backend service; and a security proxy coupled to the end-user application to obtain and inject the security information into the request to enable the end-user application to access the backend service. - View Dependent Claims (22, 23, 24)
-
Specification