US 12,406,074 B1
Request-scope security tokens
Pankil Bhatt, Seattle, WA (US); David Gootman, Vancouver (CA); and Jose Pragash Maria Susai, Bothell, WA (US)
Assigned to Amazon Technologies, Inc., Seattle, WA (US)
Filed by Amazon Technologies, Inc., Seattle, WA (US)
Filed on Mar. 26, 2021, as Appl. No. 17/214,246.
Int. Cl. G06F 21/00 (2013.01); G06F 21/44 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/606 (2013.01) [G06F 21/44 (2013.01); G06F 21/6227 (2013.01); G06F 2221/2141 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system comprising:
a first server computer comprising a security token associated with a protected data item and a request identifier associated with the security token, wherein the first server computer is configured to:
transmit the request identifier and the security token to a second server computer;
receive a request from the second server computer, wherein the request comprises the request identifier and a data payload comprising the security token,
determine that the request identifier is associated with the security token,
based on the determination that the request identifier is associated with the security token, generate a modified version of the data payload, wherein the modified version of the data payload comprises the protected data item associated with the security token, and
transmit a request comprising the modified version of the data payload to a third server computer; and
the second server computer, wherein the second server computer is configured to:
receive the request identifier and the security token from the first server computer,
generate the data payload comprising the security token, and
transmit the request comprising the request identifier and the data payload to the first server computer.