APPROACHES FOR SECURING MIDDLEWARE DATA ACCESS
First Claim
1. A computer-implemented method, comprising:
- determining, by a computing system, an access request provided by an entity that seeks to interact with one or more backend systems through a middleware system, the access request including a genuine access token;
authenticating, by the computing system, the entity based on the genuine access token; and
providing, by the computing system, the access request to the middleware system, wherein the access request is modified to replace the genuine access token with an invalid access token.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for determining an access request provided by an entity that seeks to interact with one or more backend systems through a middleware system, the access request including a genuine access token. The entity can be authenticated based on the genuine access token. When a client request is made to the middleware system with a genuine access token, the request can be made through a smart ingress and egress proxy which intercepts the request and replaces the genuine access token with an invalid access token. The middleware system can subsequently make authorized requests to downstream systems on behalf of the middleware system'"'"'s client by treating the smart proxy as an egress proxy for those subsequent requests, and the smart proxy replaces the invalid access token with a genuine one.
0 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
determining, by a computing system, an access request provided by an entity that seeks to interact with one or more backend systems through a middleware system, the access request including a genuine access token; authenticating, by the computing system, the entity based on the genuine access token; and providing, by the computing system, the access request to the middleware system, wherein the access request is modified to replace the genuine access token with an invalid access token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
one or more processors; and a memory storing instructions that, when executed by the one or more processors, cause the system to perform; determining an access request provided by an entity that seeks to interact with one or more backend systems through a middleware system, the access request including a genuine access token; authenticating the entity based on the genuine access token; and providing the access request to the middleware system, wherein the access request is modified to replace the genuine access token with an invalid access token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium comprising instructions that, when executed, cause one or more processors to perform:
-
determining an access request provided by an entity that seeks to interact with one or more backend systems through a middleware system, the access request including a genuine access token; authenticating the entity based on the genuine access token; and providing the access request to the middleware system, wherein the access request is modified to replace the genuine access token with an invalid access token. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification