MicroStrategy Incorporated
AUTHENTICATION FOR REQUESTS FROM THIRD-PARTY INTERFACES

Last updated:

Abstract:

Methods, systems, and apparatus, including computer-readable media, for authentication requests from third party interfaces. In some implementations, an information request is received to an information system from a computing system that provides a natural language interface, wherein the information request is associated with a user, and (ii) a token corresponding to the information request. In response to receiving the information request, a user data request and the token corresponding to the information request are sent for requesting user profile information for the user associated with the information request. A user identifier is extracted from user profile information received from the trusted profile provider system. A user identity is identified for the user based on a match between the extracted user identifier and a user identifier in a user registry associated with the information system. The information request is processed based on the identified user identity.

Status:
Application
Type:

Utility

Filling date:

18 Sep 2020

Issue date:

18 Mar 2021