G06F21/41

Login token management

Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.

Login token management

Techniques for securing user data in a healthcare data management system are described. A client system receives a request to authenticate a user. The user is associated with applications and roles. The user is authenticated, at the client system, for all applications and all roles. A login token relating to the authenticated user is maintained at the client system. A role is selected for the user, and an authorization token relating to the selected role is maintained at the client system. A session for the user is initiated. This includes generating an encrypted session cookie relating to the user and the session, storing the encrypted session cookie at the client system, and periodically updating a timestamp for the session cookie.

Sharing authentication between applications
11695748 · 2023-07-04 · ·

Systems and methods for sharing authentication between applications include receiving a request to share authentication from a first application with a second application. An account identifier and identity token for a user are obtained from the first application. Access to a communication application associated with the account identifier is verified as available. The account identifier and identity token are sent to a second application server for verification with a first application server. A verification message is received in the communication application from the second application server. The verification message is determined to contain confirmation information and authentication is shared from the first application with the second application. Related systems and methods include retrieving information associated with an operating system to facilitate sharing authentication between applications.

Message right management method, device and storage medium

A message right management method, and a device and storage medium for implementing the method, are provided. The message right management method includes obtaining a message created by a source user, and sending a message notification to a target user in a social platform. The method further includes verifying the target user when receiving a request for logging onto a message page from the target user, and controlling logon of the target user to the message page on the basis of a verification result. The method further includes, when receiving a service request of the target user with respect to the message, determining, based on a message right control policy, whether the target user has a right corresponding to a service requested by the service request, and controlling a response to the service request according to a determining result.

Message right management method, device and storage medium

A message right management method, and a device and storage medium for implementing the method, are provided. The message right management method includes obtaining a message created by a source user, and sending a message notification to a target user in a social platform. The method further includes verifying the target user when receiving a request for logging onto a message page from the target user, and controlling logon of the target user to the message page on the basis of a verification result. The method further includes, when receiving a service request of the target user with respect to the message, determining, based on a message right control policy, whether the target user has a right corresponding to a service requested by the service request, and controlling a response to the service request according to a determining result.

Digital safety and account discovery

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

Digital safety and account discovery

Methods, computer-readable media, software, and apparatuses may assist a consumer in keeping track of a consumer's accounts in order to prevent unauthorized access or use of the consumer's identified subscriptions and financial accounts. The identified subscriptions and financial accounts may be displayed to the consumer along with recommendations and assistance for closing unused or unwanted financial accounts and subscriptions to prevent unauthorized access or use.

Credential mapping for analytics platform
11539534 · 2022-12-27 · ·

An analytics platform or another system is provided to store multiple sets of credentials and other connection information in each user profile and to map the stored credentials to different resources within the platform. Each set of credentials can be associated with a credential mapping key, and each resource in the platform can be mapped to the credentials using a connection associating the resource with the credential mapping key. By mapping multiple sets of credentials and other connection information to the resources within the platform, the user profile can be transparently authenticated when accessing resources in the platform, different credentials can be used to authenticate the user profile with accessing different resources, and administrators can benefit by having greater control over permissions with the platform.

Credential mapping for analytics platform
11539534 · 2022-12-27 · ·

An analytics platform or another system is provided to store multiple sets of credentials and other connection information in each user profile and to map the stored credentials to different resources within the platform. Each set of credentials can be associated with a credential mapping key, and each resource in the platform can be mapped to the credentials using a connection associating the resource with the credential mapping key. By mapping multiple sets of credentials and other connection information to the resources within the platform, the user profile can be transparently authenticated when accessing resources in the platform, different credentials can be used to authenticate the user profile with accessing different resources, and administrators can benefit by having greater control over permissions with the platform.

METHOD, SYSTEM AND COMPUTER PROGRAM FOR REGISTERING A USER WITH A THIRD-PARTY SERVICE
20220405357 · 2022-12-22 ·

A method of registering a user with a third-party service using an identity verification process, comprising receiving configuration data from the third-party service. The configuration data comprises a user number associated with the user of the third-party service; and application data associated with the third-party service. The configuration data is used to generate a uniform resource identifier, URI, for an application associated with the identity verification process, distributing the URI to a device associated with the user; and receiving a notification from the device indicating that the user has accessed the URI. In response to receiving the notification, at least part of the configuration data is sent to configure the application on the device in order for the user to perform the identity verification process, associated with the third-party service, to register with the third-party service.