Application-to-application security in enterprise security services
First Claim
1. A system to provide application-to-application enterprise security for different applications on different platforms where there is no continuing context or session and a new context is created with new invocations from one of the applications to another, the system comprising:
- a first computer comprising a security application program interface and an application program interface coupled to a client application on a first platform, the security application program interface operable to provide a security credential;
an authentication authority receiving the security credential from the security application program interface, the authentication authority further generates a token and communicates the token to the security application program interface where the security credential is valid, wherein the token contains user credentials encoded as a platform and application independent string data type;
a store maintaining data validating the security credential, the store in communication with the authentication authority to validate the security credential,the application program interface coupled to the client application communicating regarding the validity of the token; and
a second computer comprising a distinct server application on a second platform to receive the token from the application program interface coupled to the client application, a security application program interface coupled to the distinct server application communicating with the authentication authority to validate the token to enable the client application to use services of the server application, wherein there is no continuing context or session and a new context is created with every invocation of service of the distinct server application by the client application.
6 Assignments
0 Petitions
Accused Products
Abstract
The present system allows disparate secure applications to communicate directly with one another in a heterogeneous application environment by providing for the creation of tokens that can be passed between the applications without human intervention. Security information is passed between applications in the form of a token with a string data type. Since a string is a primitive data type, it can be recognized by a large number of applications and interfaces. The token has no header and therefore no application-specific header configuration, making it platform and technology independent. This eliminates the need for conversion of security information between different formats. The use of tokens also eliminates the need for an application to be authenticated and authorized every time it sends a message to another application. Instead of a permanent context or session, a context is created with every invocation from one application to another.
-
Citations
32 Claims
-
1. A system to provide application-to-application enterprise security for different applications on different platforms where there is no continuing context or session and a new context is created with new invocations from one of the applications to another, the system comprising:
-
a first computer comprising a security application program interface and an application program interface coupled to a client application on a first platform, the security application program interface operable to provide a security credential; an authentication authority receiving the security credential from the security application program interface, the authentication authority further generates a token and communicates the token to the security application program interface where the security credential is valid, wherein the token contains user credentials encoded as a platform and application independent string data type; a store maintaining data validating the security credential, the store in communication with the authentication authority to validate the security credential, the application program interface coupled to the client application communicating regarding the validity of the token; and a second computer comprising a distinct server application on a second platform to receive the token from the application program interface coupled to the client application, a security application program interface coupled to the distinct server application communicating with the authentication authority to validate the token to enable the client application to use services of the server application, wherein there is no continuing context or session and a new context is created with every invocation of service of the distinct server application by the client application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for providing application-to-application enterprise security for different applications on different platforms where there is no continuing context or session and a new context is created with new invocations from one of the applications to another, the method comprising:
-
coupling a security application program interface and an application program interface to a client application on a first platform; communicating a security credential from the security application program interface to an authentication authority; communicating information related to the security credential between the authentication authority and a data store to determine whether the security credential is valid; generating a token by the authentication authority when the security credential is valid, wherein the token contains user credentials encoded as a platform and application independent string data type; communicating the token to a security application program interlace of the client application; providing, by the application program interface coupled to the client application on the first platform, the token to a distinct server application, the distinct server application on a second platform, wherein there is no continuing context or session and a new context is created with each of a plurality of invocations of service of the distinct server application by the client application; and communicating, by a security application program interface coupled to the distinct server application, with the authentication authority to validate the token before providing access to services of the distinct server application by the client application. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system to provide application-to-application enterprise security for different applications on different platforms where there is no continuing context or session and a new context is created with new invocations from one of the applications to another, the system comprising:
-
a first computer comprising a first application program interface coupled to a first application on a first platform and a first security application program interface coupled to the first application on the first platform, to provide a first security credential; a first security application program interface coupled to the first application on the first platform, to provide a first security credential; a second computer comprising a second application program interface coupled to a second application on a second platform and a second security application program interface coupled to the second application on the second platform, to provide a second security credential; an authentication authority receiving the first and second security credentials from the first and second security application program interfaces, the authentication authority further generating tokens and communicating the tokens to the first and second security application program interfaces where the first and second security credentials are valid, wherein the tokens contain user credentials encoded as a platform and application independent string data type, wherein the tokens generated by the authentication authority are further defined as a first token generated by the authentication authority for the first application based on the first security credential and a second token generated by the authentication authority for the second application based on the second security credential; a store maintaining data validating the first and second security credentials, the store in communication with the authentication authority to validate the first and second security credentials; the first application program interface communicating regarding tokens; and the second application program interface receiving the first token from the first application program interface, wherein there is no continuing context or session and a new context is created with each invocation of the second application program interface by the first application program interface, the second security application program interface communicating with the authentication authority to validate the first token to enable the first application to use services of the second application and wherein the first application program interface receives the second token from the second application program interface, wherein there is no continuing context or session and a new context is created with each invocation of the first application program interface by the second application program interface, the first security application program interface communicating with the authentication authority to validate the second token to enable the second application to use services of the first application. - View Dependent Claims (29, 30, 31, 32)
-
Specification