Providing application programs with access to secured resources
First Claim
1. A computer-implemented method for receiving access to secured resources, the method comprising:
- sending, from an application program of a computer system and for receipt by a token providing system, a first request to obtain a temporary authentication token that is able to be used to access portions of secured resources that are stored by a resource providing system, wherein the token providing system stores a primary authentication token that the token providing system uses to obtain the temporary authentication token, wherein the first request does not include the primary authentication token;
receiving, by the application program and as having been sent by the token providing system, the temporary authentication token;
sending, by the application program and for receipt by a resource providing system, a second request that (i) is to obtain a first portion of the secured resources, and (ii) includes the temporary authentication token to indicate to the resource providing system that the application program is authorized to receive the first portion of the secured resources; and
receiving, by the application program and as having been sent by the resource providing system responsive to the application program sending the second request, the first portion of the secured resources.
2 Assignments
0 Petitions
Accused Products
Abstract
In general, the subject matter described in this specification can be embodied in methods, systems, and program products for providing access to secured resources. A token providing system stores a primary authentication token that is used to obtain temporary authentication tokens. The token providing system provides, to application programs that are unable to access the primary authentication token, the temporary authentication tokens. The token providing system receives, from a first application program of the application programs, a first request to obtain a first temporary authentication token. The first request does not include the primary authentication token. The token providing system transmits a second request to obtain the first temporary authentication token. The second request includes the primary authentication token. The token providing system receives the first temporary authentication token. The token providing system provides the first temporary authentication token for use by the first application program.
149 Citations
20 Claims
-
1. A computer-implemented method for receiving access to secured resources, the method comprising:
-
sending, from an application program of a computer system and for receipt by a token providing system, a first request to obtain a temporary authentication token that is able to be used to access portions of secured resources that are stored by a resource providing system, wherein the token providing system stores a primary authentication token that the token providing system uses to obtain the temporary authentication token, wherein the first request does not include the primary authentication token; receiving, by the application program and as having been sent by the token providing system, the temporary authentication token; sending, by the application program and for receipt by a resource providing system, a second request that (i) is to obtain a first portion of the secured resources, and (ii) includes the temporary authentication token to indicate to the resource providing system that the application program is authorized to receive the first portion of the secured resources; and receiving, by the application program and as having been sent by the resource providing system responsive to the application program sending the second request, the first portion of the secured resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 19, 20)
-
-
10. A computer system for providing access to secured resources, the system comprising:
-
one or more processors; and one or more computer-readable devices that store instructions that, when executed by the one or more processors, cause performance of operations that comprise; sending, from an application program of a computer system and for receipt by a token providing system, a first request to obtain a temporary authentication token that is able to be used to access portions of secured resources that are stored by a resource providing system, wherein the token providing system stores a primary authentication token that the token providing system uses to obtain the temporary authentication token, wherein the first request does not include the primary authentication token; receiving, by the application program and as having been sent by the token providing system, the temporary authentication token; sending, by the application program and for receipt by a resource providing system, a second request that (i) is to obtain a first portion of the secured resources, and (ii) includes the temporary authentication token to indicate to the resource providing system that the application program is authorized to receive the first portion of the secured resources; and receiving, by the application program and as having been sent by the resource providing system responsive to the application program sending the second request, the first portion of the secured resources. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification