CPC G06F 9/547 (2013.01) [G06F 9/44505 (2013.01); G06F 16/148 (2019.01)] | 20 Claims |
1. A system for fetching, securing, and controlling private credentials over a disparate communication network without recompiling source code by configuring, at runtime, a network application programming interface (API) of client applications executing on user devices, the system comprising:
one or more processors; and
a non-transitory, computer-readable medium, comprising instructions that, when executed by the one or more processors, cause operations comprising:
receiving, at a user device from a repository network system, a first request for user data from a source network system, wherein the user data is accessible to the user device based on access credentials implemented on the user device, and wherein the user data comprises a blockchain operation corresponding to a first cryptography-based storage application corresponding to a user account accessible to the user device;
parsing, by a client application on the user device, a plurality of configuration files to determine a corresponding plurality of source APIs, wherein each of the plurality of source APIs corresponds to a respective source network system external to the user device;
determining a source API of the plurality of source APIs based on a configuration file of the plurality of configuration files that corresponds to the source API;
configuring a network API of the client application based on the configuration file;
establishing successful communicable connectivity with the source network system using the source API;
generating, by the client application, a second request based on the first request and the source API;
transmitting, by the client application, the second request for the user data to the source network system;
in response to transmitting the second request for the user data to the source network system, receiving first response data from the source network system;
generating, based on the configuration file, second response data; and
transmitting the second response data to the repository network system, wherein the repository network system validates an accuracy and a source of the second response data without exchanging the access credentials with the source network system.
|