×

Run-time trust management system for access impersonation

  • US 10,581,826 B2
  • Filed: 10/12/2016
  • Issued: 03/03/2020
  • Est. Priority Date: 10/22/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at a computer system of an access management system, from a first device associated with a first user, a request by the first user for access to a resource at the first device, wherein access to the resource by the first user is requested based on access to the resource permitted to a second user, and wherein the first user is different from the second user;

    in response to receiving the request by the first user for access to the resource, processing the request, which includes;

    (i) authenticating the first user based on credential information for the first user, and (ii) determining whether the first user is authorized to access the resource on behalf of the second user based on a policy for impersonation of the second user by the first user;

    based on determining that the first user is authenticated and authorized to access the resource on behalf of the second user, generating security data to provide the first user with access to the resource requested by the first user, wherein the security data includes first security data for the first user and second security data for the second user;

    sending, from the computer system, the first security data to the first device;

    sending, from the computer system, the second security data to a second device associated with the second user;

    receiving, by the computer system, first security information from the first device;

    receiving, by the computer system, second security information from the first device;

    determining whether the received first security information matches first information in the first security data that is sent to the first device from the computer system;

    determining whether the received second security information matches second information in the second security data that is sent to the second device from the computer system; and

    based on determining that the received first security information matches the first information in the first security data and based on determining that the received second security information matches the second information in the second security data;

    enabling, by the computer system, the first user to access the resource at the first device, wherein the access to the resource is enabled based on the access to the resource permitted to the second user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×