Methods and apparatus to grant access to cloud computing resources
First Claim
1. A method to grant authorization to a user for accessing a cloud computing resource, the method comprising:
- receiving a first natural-language message posted by a user on a social media network;
interpreting, with a processor and using an autonomous computer-executable process, the first natural-language message to form a search query;
determining, with a processor and using an autonomous computer-executable process, a conversation context profile based on an overlap of a user profile, a group profile, and a domain profile associated with the user;
executing, with the processor and using the autonomous computer-executable process, the search query to identify the cloud computing resource, the search executed within a scope of the conversation context profile, wherein executing the search query within the scope of the conversation context profile includes limiting results of executing the search query to information contained in the scope of the conversation context profile;
determining, with the processor and using the autonomous computer-executable process, whether the user is authorized to access the identified cloud computing resource;
when the user is not authorized to access the cloud computing resource, determining, with the processor and using the autonomous computer-executable process, whether the authorization can be automatically granted without human intervention;
when the authorization can be automatically granted without the human intervention, granting the authorization to the user; and
when the authorization cannot be automatically granted, sending a second message to an administrator to request the human intervention to grant to the user the authorization to access the cloud computing resource.
3 Assignments
0 Petitions
Accused Products
Abstract
An example method to grant authorization to a user for accessing a cloud computing resource involves receiving a first message from a user via a social media interface. The first message includes a request to access a cloud computing resource. The example method involves determining whether the user is authorized to access the cloud computing resource. When the user is not authorized to access the cloud computing resource, the example method involves determining whether the authorization can be automatically granted without human intervention. When the authorization can be automatically granted without human intervention, the authorization is granted to the user. When the authorization cannot be automatically granted, a second message is sent to an administrator to request the human intervention to grant the user the authorization to access the cloud computing resource.
42 Citations
26 Claims
-
1. A method to grant authorization to a user for accessing a cloud computing resource, the method comprising:
-
receiving a first natural-language message posted by a user on a social media network; interpreting, with a processor and using an autonomous computer-executable process, the first natural-language message to form a search query; determining, with a processor and using an autonomous computer-executable process, a conversation context profile based on an overlap of a user profile, a group profile, and a domain profile associated with the user; executing, with the processor and using the autonomous computer-executable process, the search query to identify the cloud computing resource, the search executed within a scope of the conversation context profile, wherein executing the search query within the scope of the conversation context profile includes limiting results of executing the search query to information contained in the scope of the conversation context profile; determining, with the processor and using the autonomous computer-executable process, whether the user is authorized to access the identified cloud computing resource; when the user is not authorized to access the cloud computing resource, determining, with the processor and using the autonomous computer-executable process, whether the authorization can be automatically granted without human intervention; when the authorization can be automatically granted without the human intervention, granting the authorization to the user; and when the authorization cannot be automatically granted, sending a second message to an administrator to request the human intervention to grant to the user the authorization to access the cloud computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus to grant authorization to a user for accessing a cloud computing resource, the apparatus comprising:
a social media interface to receive a first message posted by a user to a social media network; a natural-language processor to interpret the first message to form a search query; a conversation context profile generator to determine a conversation context profile based on an overlap of a user profile, a group profile, and a domain profile associated with the user; a search executor to execute the search query within a scope of the conversation context profile to identify the cloud computing resource, wherein executing the search query within the scope of the conversation context profile includes limiting results of executing the search query to information contained in the scope of the conversation context profile; an entitlement analyzer to; determine, using an autonomous computer-executable process, whether the user is authorized to access the cloud computing resource; and determine, using the autonomous computer-executable process, whether the authorization can be automatically granted without human intervention; and an entitlement interface to; grant the authorization to the user when the authorization can be automatically granted without the human intervention; and send a second message to an administrator to request the human intervention to grant the authorization to the user to access the cloud computing resource when the authorization cannot be automatically granted, at least one of the social media interface, the natural language processor, the entitlement analyzer or the entitlement interface including a logic circuit. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
21. A non-transitory computer-readable medium comprising computer readable instructions that, when executed, cause at least one processor to at least:
-
receive a first natural-language message posted by a user on a social media network; interpret, using an autonomous computer-executable process, the first natural-language message to form a search query; determine, using an autonomous computer-executable process, a conversation context profile based on an overlap of a user profile, a group profile, and a domain profile associated with the user; execute, using the autonomous computer-executable process, the search query to identify the cloud computing resource; limit, using the autonomous computer-executable process, a result of the search query to information contained in a scope of the conversation context profile; determine, using the autonomous computer-executable process, whether the user is authorized to access the cloud computing resource; determine, using the autonomous computer-executable process, whether the authorization can be automatically granted without human intervention; grant the authorization to the user when the authorization can be automatically granted without the human intervention; and send a second message to an administrator to request the human intervention to grant the user the authorization to access the cloud computing resource when the authorization cannot be automatically granted. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification