| CPC H04L 9/3213 (2013.01) [H04L 63/0807 (2013.01); H04L 63/10 (2013.01); H04L 9/3247 (2013.01)] | 19 Claims |

|
1. A computer-implemented method comprising:
receiving, via a mobile device, a first request to access a first application of a first entity,
wherein the first application includes first metadata indicative of a first set of business functions provided by the first application;
receiving, from an authentication service provider, user authentication information that attests to an identity of the user;
responsive to receiving the first request and the user authentication information,
determining, using a user information database and based on the user authentication information, a second set of business functions accessible to the mobile device;
creating a token usable to determine a third set of business functions accessible to the mobile device through the first application,
wherein the token is based on the second set of business functions and the first metadata,
wherein the token can be decoded using a first secret of the first application to determine the third set of business functions;
providing, to the mobile device, access to the third set of business functions through the first application;
receiving, from the mobile device, a second request to access a second application of the first entity,
wherein the second application includes second metadata indicative of a fourth set of business functions provided by the second application;
responsive to receiving the second request, decoding, using the first secret, the token to determine the second set of business functions;
responsive to decoding the token using the first secret, providing the second set of business functions to the second application to enable a fifth set of business functions accessible to the mobile device through the second application to be determined; and
providing, to the mobile device, access to the fifth set of business functions through the second application.
|