×

Controlling user access to command execution

  • US 10,397,232 B2
  • Filed: 06/25/2015
  • Issued: 08/27/2019
  • Est. Priority Date: 06/25/2015
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method comprising:

  • receiving, by a shell aggregator executing on one or more computing systems, a request from a user indicating a command to be executed by each of a plurality of computing nodes that are provided by a network-accessible service for use by the user and that are each executing one or more programs on behalf of the user, wherein execution of the command by each corresponding computing node of the plurality of computing nodes causes each corresponding computing node to gather information regarding itself;

    determining, by the shell aggregator and based at least in part on permissions information stored externally to the plurality of computing nodes, that the user is authorized to have the command be executed by each of the plurality of computing nodes;

    initiating, by the shell aggregator and in response to the determining, execution of the command by each of the plurality of computing nodes to gather the information, including;

    executing the command by a first computing node of the plurality of computing nodes for the user; and

    denying execution of the command for the user by a second computing node of the plurality of computing nodes based on additional security information stored locally on the second computing node;

    receiving, by the shell aggregator, results including the gathered information from the execution of the command by each of the plurality of computing nodes;

    aggregating, by the shell aggregator, the received results to generate aggregated results; and

    returning the aggregated results to the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×