×

Token management

  • US 9,935,934 B1
  • Filed: 03/31/2015
  • Issued: 04/03/2018
  • Est. Priority Date: 03/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving user identification information identifying a user for providing user access to a plurality of third-party resources;

    selecting, from a plurality of shards by one or more computing devices, a shard in response to receiving the user identification information;

    storing, in a token repository by the one or more computing devices, a mapping of information identifying the selected shard to the user identification information identifying the user;

    receiving a request to access a particular third-party resource of the plurality of third-party resources without receiving, from the user, credentials for accessing the particular third-party resource;

    in response to receiving the request to access the particular third-party resource without receiving, from the user, credentials for accessing the particular third-party resource, determining, by the one or more computing devices, whether the credentials for accessing the particular third-party resource are cached in the selected shard;

    in response to determining that the credentials for accessing the particular third-party resource are cached in the selected shard, selecting, by the one or more computing devices, the credentials for accessing the particular third-party resource from among two or more credentials that are associated with the user and are stored in the selected shard, the credentials for accessing the particular third-party resource comprising a third-party resource access token that provides access to the particular third-party resource; and

    in response to determining that the credentials for accessing the particular third-party resource are not cached in the selected shard;

    determining, by the one or more computing devices, whether information identifying accounts associated with the user is stored in the token repository that stores the mapping of the information identifying the selected shard to the user identification information identifying the user, the accounts associated with the user including (i) user account identification for each of the plurality of third-party resources; and

    (ii) credential information for accessing the plurality of third-party resources;

    in response to determining that information identifying accounts associated with the user is stored in the token repository;

    obtaining a list of stored accounts associated with the user from the information identifying accounts associated with the user stored in the token repository; and

    obtaining, from the list of stored accounts associated with the user, the third-party resource access token that provides access to the particular third-party resource;

    in response to determining that information identifying accounts associated with the user is not stored in the token repository;

    obtaining, from the particular third-party resource by the one or more computing devices, the third-party resource access token that provides access to the particular third-party resource after the credentials for accessing the particular third party resource are received from the user and authenticated; and

    storing, as part of the mapping in the token repository, a mapping of the third-party resource access token to the user identification information identifying the user and the selected shard; and

    providing, by the one or more computing devices, access to the particular third-party resource for the user using the selected shard and the third-party resource access token that provides access to the particular third-party resource.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×