Differentiated authentication for compartmentalized computing resources
First Claim
1. A computer-implemented method for accessing groups of computing resources, comprising:
- under control of one or more computing systems comprising memory and one or more processors;
organizing one or more computing resources accessible in a desktop environment into a group, the one or more computing resources including at least one of a data content, an application, a network portal, or a device, the organizing based at least in part on;
a usage pattern associated with user interaction with the one or more computing resources in the group;
a reliability of the one or more computing resources; and
performance demands of the one or more computing resources; and
providing an authentication policy to associate one or more authentication inputs with individual actions of a plurality of actions directed to individual computing resources of the one or more computing resources within the group, wherein the plurality of actions include one or more types of individual actions and individual authentication inputs of the one or more authentication inputs are based at least in part on the one or more types of individual actions;
determining that a user initiates a type of individual action of the one or more types of the individual actions directed to an individual computing resource of the individual computing resources within the group;
receiving an authentication input of the one or more authentication inputs based at least in part on determining that the user initiates the type of individual action directed to the individual computing resource;
determining that the authentication input is verified; and
allowing the type of individual action initiated by the user to be performed by the individual computing resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments for providing differentiated authentication for accessing groups of compartmentalized computing resources, and accessing each compartmentalized computing resources, as displayed on a desktop environment of an operating system. In one embodiment, a method includes organizing one or more computing resources accessible in a desktop environment into a group. The one or more computing resources include a data content, an application, a network portal, and a device. The method also includes providing an authentication policy for actions that can be performed on each computing resource. The authentication policy is configured to associate an authentication input to each action for a particular computing resource. The method further includes receiving an authentication input when the user intends one of the actions on the particular computing resource. The method additionally includes allowing the user to perform the intended action on the particular computing resource when the received authentication input enables the intended action.
54 Citations
20 Claims
-
1. A computer-implemented method for accessing groups of computing resources, comprising:
-
under control of one or more computing systems comprising memory and one or more processors; organizing one or more computing resources accessible in a desktop environment into a group, the one or more computing resources including at least one of a data content, an application, a network portal, or a device, the organizing based at least in part on; a usage pattern associated with user interaction with the one or more computing resources in the group; a reliability of the one or more computing resources; and performance demands of the one or more computing resources; and providing an authentication policy to associate one or more authentication inputs with individual actions of a plurality of actions directed to individual computing resources of the one or more computing resources within the group, wherein the plurality of actions include one or more types of individual actions and individual authentication inputs of the one or more authentication inputs are based at least in part on the one or more types of individual actions; determining that a user initiates a type of individual action of the one or more types of the individual actions directed to an individual computing resource of the individual computing resources within the group; receiving an authentication input of the one or more authentication inputs based at least in part on determining that the user initiates the type of individual action directed to the individual computing resource;
determining that the authentication input is verified; andallowing the type of individual action initiated by the user to be performed by the individual computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 19)
-
-
9. A computer storage device storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
-
organizing one or more first computing resources accessible in a desktop environment into a first group, the one or more first computing resources including at least one of a data content, an application, a network portal, or a device, wherein the organizing is based at least in part on; a usage pattern associated with user interaction with the one or more first computing resources in the first group; a reliability of the one or more first computing resources; and performance demands of the one or more first computing resources; providing an authentication policy that associates one or more authentication inputs with individual actions of a plurality of actions directed to the first group, the authentication policy associating; a first authentication input of the one or more authentication inputs with a first individual action of the individual actions; and a second authentication input of the one or more authentication inputs with a second individual action of the individual actions, wherein the first individual action is a different type of action than the second individual action and the first authentication input is different from the second authentication input based at least in part on the first individual action being the different type of action than the second individual action; receiving an authentication input of the one or more authentication inputs when a user directs one of the first individual action or the second individual action to the first group, the authentication input received on a first device; and allowing the user to perform the first individual action in response to determining that the authentication input is the first authentication input and allowing the user to perform the second individual action in response to determining that the authentication input is the second authentication input. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 20)
-
-
17. A system for accessing groups of computing resources, comprising:
-
memory; one or more processors; and programming instructions stored on the memory that, based on execution by the one or more processors, configure the one or more processors to; organize one or more computing resources accessible in a desktop environment into a group, the one or more computing resources include at least one of a data content, an application, a network portal, or a device, the organizing based at least in part on; a usage pattern associated with user interaction with the one or more computing resources in the group; a reliability of the one or more computing resources; and performance demands of the one or more computing resources; provide an authentication policy that respectively associates one or more authentication inputs with a plurality of actions for the group, individual authentication inputs of the one or more authentication inputs being different from other authentication inputs of the one or more authentication inputs based at least in part on a type of individual action of the plurality of actions associated with the individual authentication inputs; determine that a user directs an action of the plurality of actions to the group; based at least in part on determining that the user directs the action, receive an authentication input of the one or more authentication inputs corresponding to the action;
verify the authentication input; andallow the action directed by the user to be performed by the group. - View Dependent Claims (18)
-
Specification