Virtual requests
First Claim
1. A computer-implemented method, comprising:
- constructing, by a computer system, a virtual request that includes a time-dependent request component, a service-dependent request component, and an action-dependent request component;
applying, by the computer system, keying material to the virtual request to produce a virtual request signature;
forming a claim based at least in part on a principal identity and the virtual request signature;
receiving, from a servicer computer different from the computer system, a client request, according to a first protocol, to reconstruct the virtual request with the time-dependent request component, the service-dependent request component, and the action-dependent request component; and
sending the client request, as part of an application programming interface call that is based at least in part on the virtual request, to a first service according to a second protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
A first request from a client using a first protocol is translated into one or more second requests by a servicer using a second protocol through a virtual request using the first protocol. A client may use parameters of the first protocol to pass virtual request components to the servicer. A format agreement between the client, servicer and/or authentication service may allow the servicer and/or authentication service to translate the virtual request components over the first protocol to one or more second requests using the second protocol. Virtual request components may also prove the authenticity of the virtual request received by the servicer to an authentication service. If virtual request is valid, the authentication service may issue a credential to the servicer to send the one or more second requests to an independent service. Virtual requests may be included in various protocols, including credential-based protocols and certificate exchange-based protocols.
-
Citations
17 Claims
-
1. A computer-implemented method, comprising:
-
constructing, by a computer system, a virtual request that includes a time-dependent request component, a service-dependent request component, and an action-dependent request component; applying, by the computer system, keying material to the virtual request to produce a virtual request signature; forming a claim based at least in part on a principal identity and the virtual request signature; receiving, from a servicer computer different from the computer system, a client request, according to a first protocol, to reconstruct the virtual request with the time-dependent request component, the service-dependent request component, and the action-dependent request component; and sending the client request, as part of an application programming interface call that is based at least in part on the virtual request, to a first service according to a second protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium having collectively stored thereon executable instructions that, when executed by a processor of a computer system, cause the computer system to perform operations comprising:
-
constructing a virtual request, the request including a time-dependent request component, a service-dependent request components and an action-dependent request component; applying keying material to the virtual request to produce a virtual request signature; forming a claim based at least in part on a principal identity and the virtual request signature; receiving from a servicer that is different from the computer system, a client request, according to a first protocol, to reconstruct the virtual request with the time-dependent request component, the service-dependent request component and the action-dependent request component; and sending the client request, as part of an application programming interface call that is based at least in part on the virtual request, to a first service according to a second protocol. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer system, comprising:
-
a processor; and memory, including instructions executable by the processor to cause the computer system to at least; construct a virtual request, the request including a time-dependent request component, a service-dependent request component and an action-dependent request component; apply keying material to the virtual request to produce a virtual request signature; form a claim based at least in part on a principal identity and the virtual request signature; receive from a servicer that is different from the computer system, a client request, according to a first protocol, to reconstruct the virtual request with the time-dependent request component, the service-dependent request component and the action-dependent request component; and send the client request, as part of an application programming interface call that is based at least in part on the virtual request, to a first service according to a second protocol. - View Dependent Claims (15, 16, 17)
-
Specification