System, method and computer program product for enabling access to a resource utilizing a token
First Claim
Patent Images
1. A method, comprising:
- receiving, at a first server system, a first request from a device of a user to make a resource accessible;
in response to the first request, generating, by the first server system, a token;
the first server system storing, in a memory, the token;
the first server system storing, in association with the token, pointer information that indicates a location of computer code that is executable to access the resource; and
in response to the first request, sending by the first system to the device of the user the token and an instruction to transmit the token to a second server system, wherein the token is usable by the device of the user for inclusion in a second request to the second server system and wherein the token is usable by the second server system to perform a look-up of the token, verify that the token is stored, and permit access to the resource using the pointer information.
0 Assignments
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token. These mechanisms and methods for enabling access to a resource of a multi-tenant on-demand database service utilizing a token can be utilized to prevent identification of a user attempting to access the resource, and thus unwanted use of the user'"'"'s identity.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a first server system, a first request from a device of a user to make a resource accessible; in response to the first request, generating, by the first server system, a token; the first server system storing, in a memory, the token; the first server system storing, in association with the token, pointer information that indicates a location of computer code that is executable to access the resource; and in response to the first request, sending by the first system to the device of the user the token and an instruction to transmit the token to a second server system, wherein the token is usable by the device of the user for inclusion in a second request to the second server system and wherein the token is usable by the second server system to perform a look-up of the token, verify that the token is stored, and permit access to the resource using the pointer information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, at a second server system, a request from a user device that includes a token generated by a first server system, wherein, in response to a previous request by the user device to permit access to a resource, the token is generated, stored in memory by the first server system, and associated with pointer information that indicates a location of computer code that is executable to access the resource; determining, by the second server system, that the token is stored in memory and locating the pointer information using the token; and permitting access, by the second server system, to the resource using the pointer information. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having computer instructions stored thereon that are capable, when executed by at least a first server system, of causing operations comprising:
-
receiving a first request from a device of a user to make a resource accessible; in response to the first request, generating a token; storing the token in a memory; storing, in association with the token, pointer information that indicates a location of computer code that is executable to access the resource; and in response to the first request, sending the token and an instruction to the device of the user, wherein the instruction is an instruction to transmit the token to a second server system, wherein the token is usable by the device of the user for inclusion in a second request to the second server system and wherein the token is usable by the second server system to perform a look-up of the token, verify that the token is stored, and permit access to the resource using the pointer information stored in the memory. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification