SECURE DATA EXCHANGE BETWEEN DATA PROCESSING SYSTEMS
5 Assignments
0 Petitions
Accused Products
Abstract
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
130 Citations
50 Claims
-
1-32. -32. (canceled)
-
33. A method for communication, comprising:
-
retrieving an identifier based on an identity of a user of a client application; including the retrieved identifier in a request from the client application to a server; and sending the request to the server such that the server; extracts the retrieved identifier from the request, accesses a storage associated with the server in which user profile information for the user was stored prior to the server receiving the request, retrieves the user profile information from the storage associated with the server based on the extracted identifier, generates a response to the request based on the retrieved user profile information, and sends the response to the client application. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A communication method performed by a server, the method comprising:
-
receiving, from a client device, a request including an identifier associated with a user of the client device; extracting the identifier from the request; accessing a storage device associated with the server, wherein profile information for the user was stored in the storage device prior to the server receiving the request from the client device; retrieving the user profile information from the storage device associated with the server based on the extracted identifier; generating a response to the request based on the retrieved user profile information; and sending, from the server, the response to the client device. - View Dependent Claims (40, 41, 42, 43, 44)
-
-
45. A computer-readable storage medium storing a computer program, the computer program comprising instructions, which when executed by at least one processor, perform a method comprising:
-
retrieving an identifier based on an identity of a user of a client; including the retrieved identifier in a request from the client to a server; and sending the request to the server such that the server extracts the retrieved identifier, accesses a storage device associated with the server in which user profile information for the user was stored prior to the server receiving the request, retrieves the user profile information from the storage device associated with the server based on the extracted identifier, generates a response to the request based on the retrieved user profile information, and sends the response to the client. - View Dependent Claims (46, 47, 48, 49, 50)
-
Specification