IDENTITY MANAGEMENT OVER MULTIPLE IDENTITY PROVIDERS
First Claim
Patent Images
1. A method comprising:
- requesting a backend service from multiple backend services by a requesting device; and
exposing the requested backend service though a call in by a gateway service using a token mapped to the requested backend service, without exposing any of the backend services directly to the requesting device.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and processes of advanced identity management over multiple identity providers deployable through mobile applications are provided. The process, e.g., method, includes requesting a backend service from multiple backend services by a requesting device. The method further includes exposing the requested backend service though a call in by a gateway service using a token mapped to the requested backend service, without exposing any of the backend services directly to the requesting device.
25 Citations
20 Claims
-
1. A method comprising:
-
requesting a backend service from multiple backend services by a requesting device; and exposing the requested backend service though a call in by a gateway service using a token mapped to the requested backend service, without exposing any of the backend services directly to the requesting device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, and the program instructions are readable by a computing device to cause the computing device to perform a method comprising:
-
mapping tokens to parameters in a service call to a requested backend service; making the service call to a requested backend service, from a service provider; exposing the requested backend service only to the service provider; and providing a service of the requested backend service to a device, directly from the the service provider while not exposing the backend service to the device. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a CPU, a computer readable memory and a computer readable storage medium; program instructions to enter usernames and passwords for systems on a device during a registration process; program instructions to call an identity management platform to create an identity vault using the username and password supplied by the device; program instructions to create a cryptographic hash of the username and password submitted during initial registration as a key to the vault; program instructions to send the key back to the device which uses the key and a valid identity token on future access to the vault to update, delete or create new credentials for the vault; and program instructions to map the credentials in the vault by name to a backend service, wherein the program instructions are stored on the computer readable storage medium for execution by the CPU via the computer readable memory. - View Dependent Claims (19, 20)
-
Specification