METHOD AND SYSTEM FOR INTEROPERABLE IDENTITY AND INTEROPERABLE CREDENTIALS
First Claim
1. A method, implemented on a computing device having at least one processor, storage, and a communication platform capable of connecting to a network for an external system to access a private resource in an enterprise system behind a security, comprising:
- instantiating a trusted connector in the enterprise system behind the security, wherein the trusted connector is configured to communicate with the private resource via a communication protocol;
establishing, upon being triggered by the external system, a secure communication channel between the external system and the trusted connector;
receiving a request from the external source at the trusted connector through the secure communication channel;
interpreting the request for communicating with the private resource;
sending the interpreted request to the private resource;
receiving a response from the private resource;
interpreting the response from the private resource for communicating with the external system; and
sending the interpreted response to the external system through the secure communication channel.
1 Assignment
0 Petitions
Accused Products
Abstract
The present teaching relates to identity management. In one example, a trusted connector is instantiated in the enterprise system behind a security. The trusted connector is configured to communicate with the private resource via a communication protocol. Upon being triggered by the external system, a secure communication channel is established between the external system and the trusted connector. A request is received from the external source at the trusted connector through the secure communication channel. The request is interpreted for communicating with the private resource. The interpreted request is sent to the private resource. A response is received from the private resource. The response from the private resource is interpreted for communicating with the external system. The interpreted response is sent to the external system through the secure communication channel.
42 Citations
20 Claims
-
1. A method, implemented on a computing device having at least one processor, storage, and a communication platform capable of connecting to a network for an external system to access a private resource in an enterprise system behind a security, comprising:
-
instantiating a trusted connector in the enterprise system behind the security, wherein the trusted connector is configured to communicate with the private resource via a communication protocol; establishing, upon being triggered by the external system, a secure communication channel between the external system and the trusted connector; receiving a request from the external source at the trusted connector through the secure communication channel; interpreting the request for communicating with the private resource; sending the interpreted request to the private resource; receiving a response from the private resource; interpreting the response from the private resource for communicating with the external system; and sending the interpreted response to the external system through the secure communication channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method implemented on a computing device having at least one processor, storage, and a communication platform capable of making a connection to a network for authenticating an online user, the method comprising the steps of:
-
receiving a first request for authenticating the online user with information related to a credential of the online user and a private resource for verifying the credential, wherein the private resource resides in an enterprise system behind a security; triggering a trusted connector, residing in the enterprise system behind the security, to establish a secure communication channel; sending a second request to the trusted connector via the secure communication channel requesting the private resource to verify the credential, wherein the second request is to be interpreted by the trusted connector before an interpreted request is sent from the trusted connector to the private resource; receiving a response from the trusted connector via the secure communication channel related to the verification of the credential, wherein the response is generated by the private resource and interpreted by the trusted connector; and authenticating the online user based on the response.
-
Specification