REGULATING ACCESS TO PROTECTED DATA RESOURCES USING UPGRADED ACCESS TOKENS
First Claim
1. A computer-implemented method of regulating access to protected data resources, the method comprising:
- sending a first access token from a client module, the first access token having first data access attributes associated therewith; and
in response to sending the first access token, receiving a second access token at the client module, the second access token having second data access attributes associated therewith, the first data access attributes and the second data access attributes being different.
1 Assignment
0 Petitions
Accused Products
Abstract
Various techniques and procedures related to client authorization and the management of protected data resources are presented here. One approach employs a computer-implemented method of regulating access to protected data resources. In accordance with this approach, a client sends a first access token to a server, the first access token having first data access attributes associated therewith. In response to receiving the first access token, the server sends a second access token to the client module, the second access token having second data access attributes associated therewith. The second data access attributes represent expanded or additional data access capabilities granted to the client. The client may then access protected data resources using the second data access token.
131 Citations
20 Claims
-
1. A computer-implemented method of regulating access to protected data resources, the method comprising:
-
sending a first access token from a client module, the first access token having first data access attributes associated therewith; and in response to sending the first access token, receiving a second access token at the client module, the second access token having second data access attributes associated therewith, the first data access attributes and the second data access attributes being different. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method of regulating access to protected data resources, the method comprising:
-
receiving a first access token at a server module, the first access token being associated with first data access attributes granted to a client module; and in response to receiving the first access token, sending a second access token from the server module to the client module, the second access token being associated with second data access attributes granted to the client module, the first data access attributes and the second data access attributes being different. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A server system comprising a processor and a memory, wherein the memory comprises computer-executable instructions that, when executed by the processor, cause the server system to:
-
receive a request on behalf of a client module, the request including credentials of the client module and a first access token associated with first data access capabilities of the client module, the first data access capabilities defining a restricted scope of data access for the client module; authenticating the client module, using the credentials of the client module; and in response to the authenticating, granting second data access capabilities to the client module, the second data access capabilities defining an expanded scope of data access for the client module, relative to the first data access capabilities. - View Dependent Claims (19, 20)
-
Specification