SYSTEM AND METHOD FOR THIRD PARTY AUTHENTICATION OF WEB-BASED PRINT-ON-DEMAND REQUESTS
First Claim
1. A method for allowing users of third party vendors to access print shop applications without separate authentication, comprising the steps of:
- a. creating a query-string having identification information of a third party vendor and authentication information of a user of the third party vendor, the query-string being created in response to the user'"'"'s access to the third party vendor'"'"'s web-site, the query-string being contained in an inline frame and encrypted;
b. upon receiving the encrypted query-string sent from a server of the third party vendor to a print shop server, decrypting the query-string;
c. determining whether the user has an existing account on the print shop server on the basis of the decrypted authentication information of the user; and
d. automatically logging the user into the print shop server when the user has an existing account so that the user may access and use any print-on-demand applications on the print shop server without manually inputting user authentication information on the print shop server.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and program implement a process for allowing users of third party vendors to access print shop applications without separate authentication. The process includes the steps of creating a query-string having identification information of a third party vendor and authentication information of a user of the third party vendor. The query-string is created in response to the user'"'"'s access to the third party vendor'"'"'s web-site, and is contained in an inline frame and encrypted. Upon receiving the encrypted query-string sent from a third party vendor server to a print shop server, the query-string is decrypted. It is then determined whether the user has an existing account on the print shop server. If the user has an existing account, the user is automatically logged into the print shop server so that the user may access and use any print-on-demand applications on the print shop server without manually inputting user authentication information on the print shop server.
-
Citations
35 Claims
-
1. A method for allowing users of third party vendors to access print shop applications without separate authentication, comprising the steps of:
-
a. creating a query-string having identification information of a third party vendor and authentication information of a user of the third party vendor, the query-string being created in response to the user'"'"'s access to the third party vendor'"'"'s web-site, the query-string being contained in an inline frame and encrypted; b. upon receiving the encrypted query-string sent from a server of the third party vendor to a print shop server, decrypting the query-string; c. determining whether the user has an existing account on the print shop server on the basis of the decrypted authentication information of the user; and d. automatically logging the user into the print shop server when the user has an existing account so that the user may access and use any print-on-demand applications on the print shop server without manually inputting user authentication information on the print shop server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for allowing users of third party vendors to access print-on-demand applications without separate authentication comprising at least one data processing apparatus having a non-transitory memory storing a computer software program and a processor executing the computer software program, wherein the computer software program includes program code configured to cause the at least one data processing apparatus to execute a process which comprises the steps of:
-
a. creating a query-string having identification information of a third party vendor and authentication information of a user of the third party vendor, the query-string created in response to the user'"'"'s access to the third party vendor'"'"'s web-site, the query-string being contained in an inline frame and encrypted; b. upon receiving the encrypted query-string sent from a server of the third party vendor to a print shop server, decrypting the query-string; c. determining whether the user has an existing account on the print shop server on the basis of the decrypted authentication information of the user; and d. automatically logging the user into the print shop server when the user has an existing account so that the user may access and use any print-on-demand applications on the print shop server without manually inputting user authentication information on the print shop server. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer software program product having a computer readable program code embedded in a computer usable non-transitory storage medium for controlling at least one data processing apparatus, the computer readable program code configured to cause the at least one data processing apparatus to execute a process which comprises the steps of:
-
a. creating a query-string having identification information of a third party vendor and authentication information of a user of the third party vendor, the query-string created in response to the user'"'"'s access to the third party vendor'"'"'s web-site, the query-string being contained in an inline frame and encrypted; b. upon receiving the encrypted query-string sent from a server of the third party vendor to a print shop server, decrypting the query-string; c. determining whether the user has an existing account on the print shop server on the basis of the decrypted authentication information of the user; and d. automatically logging the user into the print shop server when the user has an existing account so that the user may access and use any print-on-demand applications on the print shop server without manually inputting user authentication information on the print shop server. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification