SYSTEMS AND METHODS FOR SECURITY TOKEN MANAGEMENT SERVICE HOSTED IN APPLICATION SERVER
First Claim
1. A method of managing access to token services, comprising:
- receiving a request for at least one token service from a requesting service supporting a set of clients;
validating the request for the at least one token service;
identifying a corresponding token provider for the at least one token service via a security token management service;
acquiring at least one token from a corresponding token provider associated with the at least one token service; and
deploying the at least one token service to the requesting service.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for a security token management service hosted in an application server. A set of services and/or associated applications can be served from an application server to one or more clients. The set of services may require one or more token services in order to deliver their intended functionalities, so that for instance an email client may require the use and presentation of a token or other object incorporating user ID, password, or other authentication information for the user to access and retrieve their email messages. Different served applications and/or services may require the installation of various different token types or services, conventionally requiring manually configuration. A centralized security token management service can be installed and configured in the application server itself, which interfaces to requesting services and automatically locates and acquires diverse token types and/or associated token services to support served applications or services.
-
Citations
20 Claims
-
1. A method of managing access to token services, comprising:
-
receiving a request for at least one token service from a requesting service supporting a set of clients; validating the request for the at least one token service; identifying a corresponding token provider for the at least one token service via a security token management service; acquiring at least one token from a corresponding token provider associated with the at least one token service; and deploying the at least one token service to the requesting service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for managing access to token services, comprising:
-
an interface to a set of clients; and a processor, communicating with the set of clients via the interface, the processor being configured to— receive a request for at least one token service from a requesting service supporting the set of clients, validate the request for the at least one token service, identify a corresponding token provider for the at least one token service via a security token management service, acquire at least one token from a corresponding token provider associated with the at least one token service, and deploy the at least one token service to the requesting service. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification