PERSISTENT AUTHORIZATION CONTEXT BASED ON EXTERNAL AUTHENTICATION

METHODS AND SYSTEMS ARE PROVIDED TO ALLOW USERS (302) THAT ARE AUTHENTICATED (303) BY A TRUSTED EXTERNAL SERVICE (206) TO GAIN CONTROLLED LEVELS OF ACCESS TO SELECTED LOCAL COMPUTING RESOURCES (210, 212, 214, 216) WITHOUT REQUIRING THE USER TO ALSO HAVE CONVENTIONAL ACCESS CONTROL CAPABILITIES FOR T...

Full description

Saved in:
Bibliographic Details
Main Authors DAVID R. MOWERS, DANIEL DOUBROVKINE, RAM VISWANATHAN, JOHN E. BREZAK, RICHARD B. WARD, DONALD E. SCHMIDT, ROY LEBAN
Format Patent
LanguageEnglish
Published 30.03.2012
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:METHODS AND SYSTEMS ARE PROVIDED TO ALLOW USERS (302) THAT ARE AUTHENTICATED (303) BY A TRUSTED EXTERNAL SERVICE (206) TO GAIN CONTROLLED LEVELS OF ACCESS TO SELECTED LOCAL COMPUTING RESOURCES (210, 212, 214, 216) WITHOUT REQUIRING THE USER TO ALSO HAVE CONVENTIONAL ACCESS CONTROL CAPABILITIES FOR THE RESOURCES.
Bibliography:Application Number: MY2003PI01284