Secure data exchange for processing requests
First Claim
Patent Images
1. A method comprising:
- receiving, at a first server device, a first request and encrypted user information from a second server device, the first request being generated at a client application on a client device and forwarded from the second server device;
decrypting, by the first server device, the encrypted user information included with the first request;
storing the user information by the first server device;
generating, by the first server device, a response to the first request using the decrypted user information; and
sending, by the first server device, the response to the first request to the second server device;
sending, by the first server device, a shortcut token associated with the stored user information to the second server device for use with subsequent requests.
5 Assignments
0 Petitions
Accused Products
Abstract
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
165 Citations
22 Claims
-
1. A method comprising:
-
receiving, at a first server device, a first request and encrypted user information from a second server device, the first request being generated at a client application on a client device and forwarded from the second server device; decrypting, by the first server device, the encrypted user information included with the first request; storing the user information by the first server device; generating, by the first server device, a response to the first request using the decrypted user information; and sending, by the first server device, the response to the first request to the second server device; sending, by the first server device, a shortcut token associated with the stored user information to the second server device for use with subsequent requests. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving, at a first server device, an initial request sent from a client application, the initial request including encrypted user information; sending, by the first server device, an identifier in response to the initial request; receiving, at the first server device, a second request including the identifier, the second request being generated by the client application and modified by a second server device to include the identifier; extracting the identifier from the second request; retrieving the encrypted user information from a non-transitory storage medium using the extracted identifier; decrypting, by the first server device, the encrypted user information; processing, by the first server device, at least a portion of the second request using the decrypted user information in order to generate a response to the second request; and sending, by the first server device, the response to the second request to the client application via the second server device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a first server device; at least one non-transitory computer readable storage medium storing a decryption key and instructions thereon that, when executed cause the system the first server device to; receive a first request and encrypted user information from a second server device, the first request being generated at a client application on a client device and forwarded from the second server device; decrypt encrypted user information retrieved from the first request using the decryption key; store the user information; generate a response to the first request using the decrypted user information; send the response generated using the decrypted user information to the second server device for forwarding to the client device; send a shortcut token associated with the stored user information to the server device for use with subsequent requests. - View Dependent Claims (18, 19, 20, 21, 22)
-
Specification