System, method and computer program product for enabling access to a resource of a multi-tenant on-demand database service utilizing a token
First Claim
Patent Images
1. A method, comprising:
- receiving, at a first domain, a request from a user to make a resource accessible;
generating a token that includes a randomly generated identifier and a time-to-live;
storing the token in a record including a user identification, tenant identification, and information for accessing the resource;
sending to the user the token and an instruction to transmit the token to a second domain;
receiving, at the second domain, a request access the resource, the request including the token;
determining that the request to access the resource includes the token;
verifying the token by determining that the token is stored and the token has not expired; and
permitting access to at least one record containing the token by executing computer code.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token can be utilized to prevent identification of a user attempting to access the resource, and thus unwanted use of the user'"'"'s identity.
-
Citations
17 Claims
-
1. A method, comprising:
-
receiving, at a first domain, a request from a user to make a resource accessible; generating a token that includes a randomly generated identifier and a time-to-live; storing the token in a record including a user identification, tenant identification, and information for accessing the resource; sending to the user the token and an instruction to transmit the token to a second domain; receiving, at the second domain, a request access the resource, the request including the token; determining that the request to access the resource includes the token; verifying the token by determining that the token is stored and the token has not expired; and permitting access to at least one record containing the token by executing computer code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 12, 13, 14, 15, 16, 17)
-
-
10. A computer program product, comprising a non-transitory computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be execute to cause a computer to implement a method. the method comprising:
-
receiving, at a first domain, a request from a user to make a resource accessible; generating a token that includes a randomly generated identifier and a time-to-live; storing the token in a record including a user identification, tenant identification, and information for accessing the resource; sending to the user the token and an instruction to transmit the token to a second domain; receiving, at the second domain, a request to access the resource, the request including the token; determining that the request to access the resource includes the token; verifying the token by determining that the token is stored and the token has not expired; and permitting access to at least one record containing the token by executing computer code.
-
-
11. An apparatus, comprising:
-
a first processor for; receiving, at a first domain, a request from a user to make a resource accessible; generating a token that includes a randomly generated identifier and a time-to-live; storing the token in a record including a user identification, tenant identification, information for accessing the resource; sending to the user the token and an instruction to transmit the token to a second domain; a second processor for; receiving, at the second domain, a request to access the resource, the request including the token; determining that the request to access the resource includes the token; verifying the token by determining that the token is stored and the token has not expired; and permitting access to at least one record containing the token by executing computer code.
-
Specification