Identity And Access Management Using A Decentralized Gateway Computing System
An example method is performed by one or more processors of a gateway computing system. The method includes receiving, from a user computing system, a request to access a software application hosted on a server with which the gateway computing system is in communication. The method also includes in...
Saved in:
Main Authors | , , , |
---|---|
Format | Patent |
Language | English |
Published |
23.05.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | An example method is performed by one or more processors of a gateway computing system. The method includes receiving, from a user computing system, a request to access a software application hosted on a server with which the gateway computing system is in communication. The method also includes in response to receiving the request, communicating with the user computing system to obtain a credential for the software application issued to a user of the user computing system. The method also includes comparing the credential to credential data stored on a distributed ledger to determine whether the credential meets a set of conditions. The method also includes in response to determining that the credential meets the set of conditions, establishing an authorized session between the user computing system and the server such that communication between the user computing system and the server passes through the gateway computing system. |
---|---|
Bibliography: | Application Number: US202217992022 |