Delegation based access to secure systems

A system receives an access token generated by a user performing authentication via an authentication device, for example, a smart card. The system obtains a personalized virtual machine assigned to the user. The system exchanges the access token for a temporary certificate having an expiry time. Th...

Full description

Saved in:
Bibliographic Details
Main Authors Chikkanna, Shruthi, Westlund, Isaac, DiNicola, Mitchell Brent, Khare, Adarsh, Sridharan, Giridharan, Baluyan, Hayk, Thargan, Ajay, Komaki, Hideyuki, Jiang, Peixuan
Format Patent
LanguageEnglish
Published 30.07.2024
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A system receives an access token generated by a user performing authentication via an authentication device, for example, a smart card. The system obtains a personalized virtual machine assigned to the user. The system exchanges the access token for a temporary certificate having an expiry time. The system provides the temporary certificate that includes verifiable user identity to a personalized virtual machine. The system provides the user with access to the personalized virtual machine. The system allows the user to present verifiable user identity and connect to any of a plurality of systems without requiring the user to authenticate again using the authentication device. After the expiry time of the temporary certificate is exceeded, the system denies subsequent requests from the user to connect to any of the plurality of systems.
Bibliography:Application Number: US202217740159