METHOD AND APPARATUS FOR PROVIDING ENHANCED SERVICE AUTHORIZATION
First Claim
1. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause the one or more processors to at least perform the following steps:
- determining that a request is received from a first service provider, the request having an associated primary token and a secondary token identifier, the secondary token identifier relating to resources of a second service provider;
based on the secondary token identifier, identifying a secondary token; and
initiating sending of the secondary token to the first service provider, wherein the first service provider and the second service provider belong to different trust domains.
2 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for authorizing one or more services from service providers in a communications network. The approach includes receiving a request from a first service provider, the request having an associated primary token and a secondary token identifier, the secondary token identifier relating to resources of a second service provider. Based, at least in part, on the secondary token identifier, a secondary token is identified; and then the secondary token is sent to the first service provider, wherein the first service provider and the second service provider belong to different trust domains and the first service provider can use the secondary token to access resources of the second service provider.
93 Citations
20 Claims
-
1. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause the one or more processors to at least perform the following steps:
-
determining that a request is received from a first service provider, the request having an associated primary token and a secondary token identifier, the secondary token identifier relating to resources of a second service provider; based on the secondary token identifier, identifying a secondary token; and initiating sending of the secondary token to the first service provider, wherein the first service provider and the second service provider belong to different trust domains. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising a processor and a memory storing executable instructions that if executed cause the apparatus to at least perform the following:
-
determining that a request is received from a first service provider, the request having an associated primary token and a secondary token identifier, the secondary token identifier relating to resources of a second service provider; based on the secondary token identifier, identifying a secondary token; and initiating sending of the secondary token to the first service provider, wherein the first service provider and the second service provider belong to different trust domains. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-readable storage medium carrying one or more sequences of one or more instructions which, when executed by one or more processors, cause the one or more processors to at least perform the following steps:
-
receiving at a first service provider a request relating to accessing resources of a second service provider, the request associated with a primary token; requesting from an authorization system a secondary token, the secondary token based at least in part on the second service provider and the primary token; receiving the secondary token from the authorization system; and requesting from the second service provider access to the resources of the second service provider using the secondary token, wherein the first service provider and the second service provider belong to different trust domains. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. An apparatus comprising a processor and a memory storing executable instructions that if executed cause the apparatus to at least perform the following:
-
receiving at a first service provider a request relating to accessing resources of a second service provider, the request associated with a primary token; requesting from an authorization system a secondary token, the secondary token based at least in part on the second service provider and the primary token; receiving the secondary token from the authorization system; and requesting from the second service provider access to the resources of the second service provider using the secondary token, wherein the first service provider and the second service provider belong to different trust domains. - View Dependent Claims (18, 19, 20)
-
Specification