×

Security proxying for end-user applications

  • US 8,424,058 B2
  • Filed: 10/04/2007
  • Issued: 04/16/2013
  • Est. Priority Date: 12/07/2006
  • Status: Active Grant
First Claim
Patent Images

1. In an end-user application, a method comprising:

  • receiving input from an interface, the input soliciting an operation of the end-user application, wherein the end-user application is one of multiple enterprise widgets, limited featured applications that execute on a widget runtime environment on a computing platform of an enterprise, the enterprise widgets available to a user authenticated on the computing platform, the widget runtime environment to execute on the computing platform to provide an execution platform on the computing platform including services shared by the enterprise widgets, each enterprise widget including functionality to access enterprise data from one or more backend servers of the enterprise;

    sending, from the end-user application to the widget runtime environment, a request for a service of a backend server that provides the solicited operation, the request having insufficient security information for the backend server to authenticate the application to enable the application to access the requested service, the request to cause the widget runtime environment to use a security proxy on the widget runtime environment to determine that the request from the end-user application is missing required security information for the request, obtain the required security information not included in the request from a security information source separate from the end-user application, and to inject the security information into the request for the service of the backend server in response to determining that the request does not include the required security information and forward the request to the backend server;

    receiving the service from the backend server at the end-user application in response to the solicited operation, based on the backend server authenticating the end-user application with the security information injected by the security proxy; and

    providing a representation of data associated with the received service in the interface.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×