TRUSTED RELYING PARTY PROXY FOR INFORMATION CARD TOKENS
First Claim
Patent Images
1. An apparatus, comprising:
- a machine;
a secret mapping module running on the machine and configured to create a mapping that maps a secret to a claim stored in an information card;
a receiver running on the machine and configured to receive a request for the secret from a remote application;
a mapping query module running on the machine and configured to perform a search for the mapping;
a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim; and
a transmitter configured to transmit the secret to the remote application.
7 Assignments
0 Petitions
Accused Products
Abstract
An apparatus can include a secret mapping module running on a machine and configured to create a mapping that maps a secret to a claim stored in an information card, a receiver running on the machine and configured to receive a request for the secret from a remote application, a mapping query module running on the machine and configured to perform a search for the mapping, a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim, and a transmitter configured to transmit the secret to the remote application.
108 Citations
20 Claims
-
1. An apparatus, comprising:
-
a machine; a secret mapping module running on the machine and configured to create a mapping that maps a secret to a claim stored in an information card; a receiver running on the machine and configured to receive a request for the secret from a remote application; a mapping query module running on the machine and configured to perform a search for the mapping; a credential provider application running on the machine and configured to retrieve the secret based at least in part on the claim; and a transmitter configured to transmit the secret to the remote application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method, comprising:
-
receiving a request from a relying party for a credential; querying a plurality of information cards for a claim, wherein the credential is mapped to the claim; responsive to finding an information card comprising the claim, selecting the information card; based at least in part on the claim, retrieving the credential; and transmitting the credential to the relying party. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A tangible computer-readable medium storing instructions that, when executed by a processor, result in:
-
receiving a request from a relying party for a username and a password; performing a search for an information card comprising a first claim and a second claim, wherein the username is mapped to the first claim and the password is mapped to the second claim; based at least in part on the first and second claims, retrieving the requested username and password; and transmitting the retrieved username and password to the relying party. - View Dependent Claims (19, 20)
-
Specification