×

Bundled authorization requests

  • US 9,699,170 B2
  • Filed: 04/30/2014
  • Issued: 07/04/2017
  • Est. Priority Date: 09/29/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, at an authorization computer system, from a client application, a token request for access to a first service that is provided by a first resource server and for access to a second service that is provided by a second resource server that is separate from the first resource server;

    obtaining, at the authorization computer system, from the first resource server, a first scope of access information for the client application to access the first service identified by the token request, wherein obtaining the first scope of access information comprises;

    sending an identity of the client application from the authorization computer system to the first resource server, wherein the first resource server determines the first scope of access information by applying a first policy to one or more attributes associated with the identity of the client application; and

    receiving, at the authorization computer system, the first scope of access information from the first resource server;

    obtaining, at the authorization computer system, from the second resource server, a second scope of access information for the client application to access the second service identified by the token request, wherein the first scope of access information differs from the second scope of access information, and wherein obtaining the second scope of access information comprises;

    sending the identity of the client application from the authorization computer system to the second resource server, wherein the second resource server determines the second scope of access information by applying a second policy to the one or more attributes associated with the identity of the client application; and

    receiving, from the second resource server at the authorization computer system, the second scope of access information;

    generating, at the authorization computer system, a single token that includes the first scope of access information and the second scope of access information; and

    sending the single token from the authorization computer system to the client application for accessing the first service based on the first scope of access information included in the single token and for accessing the second service based on the second scope of access information included in the single token.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×