×

Authenticated database connectivity for unattended applications

  • US 8,839,414 B2
  • Filed: 06/01/2009
  • Issued: 09/16/2014
  • Est. Priority Date: 05/30/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing secure credentials for accessing a target resource, which when executed on one or more processors, causes the one or more processors to perform steps of:

  • receiving a connection request to the target resource from an unattended requestor application, the connection request including target resource information identifying the target resource and configuration information necessary to authenticate the requestor application, wherein the configuration information of the requestor application is fingerprint information, which uniquely identifies a node of the requestor application;

    decoding the request to extract the target resource information and the configuration information required by a credential manager to authenticate the requestor application and to retrieve the secure credentials for accessing the target resource, the credential manager managing and storing credentials for the target resource;

    securely communicating the extracted information to the credential manager to retrieve credentials;

    generating a native target resource connection request to the target resource, including the retrieved credentials; and

    passing the native target resource connection request to a native target resource connectivity component to establish a connection between the requestor application and the target resource.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×