×

System, method and computer program product for authenticating and authorizing an external entity

  • US 8,646,048 B2
  • Filed: 11/16/2010
  • Issued: 02/04/2014
  • Est. Priority Date: 03/31/2010
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product embodied on a non-transitory computer readable medium, the computer program product including instructions which, when executed by a processor, cause the processor to perform a method comprising:

  • identifying the creation of a remote access object for an entity external to a system, where the creation of the remote access object is identified within the system, and where the remote access object enables remote access of the system by the entity;

    in response to the identification of the creation of the remote access object, generating within the system both a key identifying the entity and security information associated with the entity, where the key and the security information are separate from the remote access object;

    receiving at a first instance of the system a request from the entity for user data of the user of the system, wherein the user data is stored in the system, and where the system includes a plurality of instances;

    authenticating and authorizing the entity by;

    receiving authorization from the user for the entity to access the user data,wherein the authorization is received at the system via a device of the user;

    in response to receiving the authorization from the user, providing the security information associated with the entity from the system to the entity; and

    authenticating the entity using the security information supplied by the entity to the system;

    globally replicating the key and the security information to all of the instances within the system;

    routing the request from the first instance of the system where it is received to a second instance of the system where an organization associated with the user is present for responding to the request; and

    returning the user data to the entity, based on receiving from the user the authorization for the entity to access the user data, and authenticating the entity using the security information supplied by the entity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×