Peer applications trust center
First Claim
1. A method comprising:
- registering, at a device comprising a hardware processor that executes a first application, a second application and a third application, wherein registering the third application comprises obtaining a unique identifier associated with the third application;
receiving, by the device, a request to establish a trust relationship between the second application and the third application, the request being received from the second application;
in response to determining, that the trust relationship is authorized, issuing, by the device, a token to the second application;
receiving, by the device and from the second application, an application access request comprising the unique identifier and the token, wherein the device identifies the third application based upon the unique identifier and determines if access to the third application is to be granted to the second application based on the token; and
establishing, by the device, the trust relationship between the third application and the second application, whereby the third application is granted access to the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
Concepts and technologies are disclosed herein for a peer applications trust center. A trust client can execute on a client computer and a trust service can execute on a server computer to provide the peer applications trust center. The trust client or trust server can register applications. During registration, the trust server or the trust client can generate a public key or other identifier for identifying the registered application. If another application requests access to the registered application, the trust server or the trust client can determine if the request specifies a registered application by name. If the requestor is granted access to the application, the requestor can be issued a token. Tokens can be revoked, updated, replaced, or renewed for various purposes.
18 Citations
20 Claims
-
1. A method comprising:
-
registering, at a device comprising a hardware processor that executes a first application, a second application and a third application, wherein registering the third application comprises obtaining a unique identifier associated with the third application; receiving, by the device, a request to establish a trust relationship between the second application and the third application, the request being received from the second application; in response to determining, that the trust relationship is authorized, issuing, by the device, a token to the second application; receiving, by the device and from the second application, an application access request comprising the unique identifier and the token, wherein the device identifies the third application based upon the unique identifier and determines if access to the third application is to be granted to the second application based on the token; and establishing, by the device, the trust relationship between the third application and the second application, whereby the third application is granted access to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; and a memory that stores a first application comprising computer-executable instructions that, when executed by the processor, cause the processor to perform operations comprising; registering a second application and a third application, wherein registering the third application comprises obtaining a unique identifier associated with the third application, receiving a request to establish a trust relationship between the second application and the third application, the request being received from the third application, in response to determining that the trust relationship is authorized, issuing a token to the third application, receiving, from the third application, an application access request comprising the unique identifier and the token, wherein the processor identifies the second application based upon the unique identifier and determines if access to the third application is to be granted to the second application based on the token, and establishing the trust relationship between the second application and the third application whereby the second application is granted access to the third application. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer storage medium having computer-executable instructions stored thereon that, when executed by a processor, cause the processor to execute operations associated with a first application, the operations comprising:
-
registering a second application and a third application, wherein registering the third application comprises obtaining a unique identifier associated with the third application; receiving a request to establish a trust relationship between the second application and the third application, the request being received from the third application; in response to determining that the trust relationship is authorized, issuing a token to the third application; receiving, from the third application, an application access request comprising the unique identifier and the token, wherein the processor identifies the second application based upon the unique identifier and determines if access to the third application is to be granted to the second application based on the token; and establishing the trust relationship between the second application and the third application whereby the second application is granted access to the third application. - View Dependent Claims (17, 18, 19, 20)
-
Specification