Peer Applications Trust Center
First Claim
1. A method comprising:
- receiving, at a processor executing a trust service, a request to establish a trust relationship between a second application and a first application, the request being received from the second application;
determining, by the processor, that the trust relationship is authorized;
generating, by the processor, a unique identifier that identifies the first application;
issuing, by the processor, a token to the second application;
receiving, by the processor and from the second application, an application access request comprising the unique identifier and the token, wherein the processor identifies the first application based upon the unique identifier; and
establishing, by the processor, the trust relationship between the first application and the second application whereby the first application has access to the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for a peer applications trust center. A trust client can execute on a client computer and a trust service can execute on a server computer to provide the peer applications trust center. The trust client or trust server can register applications. During registration, the trust server or the trust client can generate a public key or other identifier for identifying the registered application. If another application requests access to the registered application, the trust server or the trust client can determine if the request specifies a registered application by name. If the requestor is granted access to the application, the requestor can be issued a token. Tokens can be revoked, updated, replaced, or renewed for various purposes.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a processor executing a trust service, a request to establish a trust relationship between a second application and a first application, the request being received from the second application; determining, by the processor, that the trust relationship is authorized; generating, by the processor, a unique identifier that identifies the first application; issuing, by the processor, a token to the second application; receiving, by the processor and from the second application, an application access request comprising the unique identifier and the token, wherein the processor identifies the first application based upon the unique identifier; and establishing, by the processor, the trust relationship between the first application and the second application whereby the first application has access to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; and a memory that stores computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising; receiving a request to establish a trust relationship between a first application and a second application, the request being received from the second application, determining that the trust relationship is authorized, generating a unique identifier that identifies the first application, issuing a token to the second application, receiving, from the second application, an application access request comprising the unique identifier and the token, wherein the processor identifies the first application based upon the unique identifier, and establishing the trust relationship between the first application and the second application whereby the first application has access to the second application. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer storage medium having computer-executable instructions stored thereon that, when executed by a processor, cause the processor to execute a method comprising:
-
receiving a request to establish a trust relationship between a first application and a second application, the request being received from the second application, determining that the trust relationship is authorized, generating a unique identifier that identifies the first application, issuing a token to the second application, receiving, from the second application, an application access request comprising the unique identifier and the token, wherein the processor identifies the first application based upon the unique identifier, and establishing the trust relationship between the first application and the second application whereby the first application has access to the second application. - View Dependent Claims (17, 18, 19, 20)
-
Specification