Secure data exchange between data processing systems
First Claim
Patent Images
1. A method comprising:
- receiving, at a first hardware server, user profile information associated with a user of a client application;
storing the user profile information at the first hardware server in a non-transitory storage device;
generating, at the first hardware server, an identifier associated with the user profile information;
receiving, at the first hardware server, a request including the identifier, the request being sent from a second hardware server;
extracting the identifier from the request;
accessing the non-transitory storage device at the first hardware server in which the user profile information for the user was stored prior to the first hardware server receiving the request;
retrieving the user profile information from the non-transitory storage device based on the extracted identifier;
generating a response, by the first hardware server, to the request using the retrieved user profile information; and
sending the response to the second hardware server.
5 Assignments
0 Petitions
Accused Products
Abstract
A data transfer method performed at a proxy server includes intercepting a data request from a client computer that is directed to a target server, encrypting profile information, augmenting the data request by adding the encrypted profile information to the data request, and sending the augmented data request to the target server. A data transfer method that is performed at an information server includes receiving a data request from a proxy server, extracting profile information added to the data request by the proxy server, using the extracted profile information to generate a response, and sending the response to the proxy server.
164 Citations
19 Claims
-
1. A method comprising:
-
receiving, at a first hardware server, user profile information associated with a user of a client application; storing the user profile information at the first hardware server in a non-transitory storage device; generating, at the first hardware server, an identifier associated with the user profile information; receiving, at the first hardware server, a request including the identifier, the request being sent from a second hardware server; extracting the identifier from the request; accessing the non-transitory storage device at the first hardware server in which the user profile information for the user was stored prior to the first hardware server receiving the request; retrieving the user profile information from the non-transitory storage device based on the extracted identifier; generating a response, by the first hardware server, to the request using the retrieved user profile information; and sending the response to the second hardware server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a first hardware server, user profile information associated with a user of a client device; storing the user profile information at the first hardware server in a non-transitory storage device; generating, by the first hardware server, an identifier associated with the user profile information; receiving at the first hardware server, a request from the client device, the request having been modified by a device other than the client device to include the identifier associated with the user of the client device; extracting the identifier from the request; accessing the non-transitory storage device at the first hardware server, wherein the user profile information for the user was stored prior to the first hardware server receiving the request from the client device; retrieving the user profile information from the non-transitory storage device based on the extracted identifier; customizing, by the first hardware server, data based on the retrieved user profile information; generating a response to the request that includes the customized data; and sending, from the first hardware server, the response to the client device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium storing a computer program, the computer program comprising instructions, which when executed by at least one processor, cause a computer system to perform a method comprising:
-
receiving, at a first hardware server, user profile information associated with a user of a client application; storing the user profile information at the first hardware server in a non-transitory storage device; generating, at the first hardware server, an identifier associated with the user profile information; receiving, at the first hardware server, a request including the identifier associated with the user profile information, the request being sent from a second hardware server; extracting the identifier from the request; accessing the non-transitory storage device at the first hardware server in which the user profile information for the user was stored prior to the first hardware server receiving the request; retrieving the user profile information from the non-transitory storage device based on the extracted identifier; generating a response, by the first hardware server, to the request using the retrieved user profile information; and sending the response to the second hardware server. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
receiving, at a first hardware server from a client device, a first request including encrypted user profile information; extracting the encrypted user profile information from the first request; decrypting the encrypted user profile information; storing the decrypted user profile information in a storage device at the first hardware server; generating, at the first hardware server, an identifier associated with the user profile information; sending, to the client device, the identifier with a first response to the first request; receiving, at the first hardware server from a second hardware server, a second request including the identifier; extracting the identifier from the second request; accessing the storage device at the first hardware server, wherein the profile information for the user was stored in the storage device prior to the first hardware server receiving the second request from the client device; retrieving the user profile information from the storage device based on the extracted identifier; generating, by the first hardware server, a second response to the second request using the retrieved user profile information; and sending, from the first hardware server, the second response to the second hardware server.
-
Specification