FLEXIBLE SECURITY TOKEN FRAMEWORK
First Claim
1. A computer-implemented method executable by a server system to establish and manage security tokens for at least one application supported by the server system, the method comprising:
- creating, at the server system, a token type to be used with an application supported by the server system, the token type having a token format and a set of token use policies associated therewith, wherein the token format and the set of token use policies are dictated by obtained values of a plurality of token configuration variables;
generating, at the server system, a security token of the created token type and having the token format; and
enforcing, at the server system, the token use policies for the security token.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented server system includes or supports applications that use security tokens. The server system includes a security token module to create token types for use with the applications, to generate security tokens corresponding to created token types, and to enforce token use policies for generated security tokens. The server system also includes a database to store security tokens for the token module. The token module accommodates creation of different token types having different token formats and different token use policies, based on obtained values of a plurality of token configuration variables. The token module generates security tokens in accordance with the different token formats, and enforces the different token use policies when processing incoming security tokens.
-
Citations
20 Claims
-
1. A computer-implemented method executable by a server system to establish and manage security tokens for at least one application supported by the server system, the method comprising:
-
creating, at the server system, a token type to be used with an application supported by the server system, the token type having a token format and a set of token use policies associated therewith, wherein the token format and the set of token use policies are dictated by obtained values of a plurality of token configuration variables; generating, at the server system, a security token of the created token type and having the token format; and enforcing, at the server system, the token use policies for the security token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method executable by a security token module of a server system to establish and manage security tokens for at least one application supported by the server system, the method comprising:
-
receiving token configuration data at the security token module, the token configuration data specifying a plurality of token format settings and a plurality of token use policy settings; in response to receiving the token configuration data, the security token module creating a token type to be used with an application supported by the server system, the token type having a token format governed by the token format settings and the token type having a set of token use policies governed by the token use policy settings; generating, at the security token module, security tokens in accordance with the token format; and processing, at the security token module, incoming security tokens of the token type, wherein the processing is performed in accordance with the set of token use policies for the generated security tokens. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented server system comprising:
-
at least one application that utilizes security tokens; a security token module configured to create token types for use with the at least one application, to generate security tokens corresponding to created token types, and to enforce token use policies for generated security tokens; and a database to store generated security tokens for the security token module; wherein the security token module is configured to accommodate creation of different token types having different token formats and different token use policies, based on obtained values of a plurality of token configuration variables; wherein the security token module is configured to generate security tokens in accordance with the different token formats; and wherein the security token module is configured to enforce the different token use policies when processing incoming security tokens of the different token types. - View Dependent Claims (17, 18, 19, 20)
-
Specification