Method and system for account management
First Claim
1. A computer-based method for identifying common accounts, the method comprising:
- assigning a first user identifier to a first account, the first account being associated with a first node;
assigning a second user identifier to a second account, the second account being associated with a second node;
receiving a request from the second node that includes the first user identifier, when the first account is not already associated to the second node, determining whether the first and second accounts represent the same account; and
when it is determined that the first and second accounts represent the same account, combining the first and second accounts into a single account.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing accounts that control access to resources of different providers. The account management system allows providers to use a common logon procedure through an account management server. The account management system dynamically creates accounts when users request to access resources. To access to a resource, a user provides their credentials (e.g., user identifier and password) through a certain location (e.g., client computer) and identifies the resource (e.g., application). The account management system determines whether an account has already been created for those credentials. If not, the account management system authenticates the user, creates a new account for those credentials (i.e., registration), and associates the identified resource with the account.
-
Citations
73 Claims
-
1. A computer-based method for identifying common accounts, the method comprising:
-
assigning a first user identifier to a first account, the first account being associated with a first node;
assigning a second user identifier to a second account, the second account being associated with a second node;
receiving a request from the second node that includes the first user identifier, when the first account is not already associated to the second node, determining whether the first and second accounts represent the same account; and
when it is determined that the first and second accounts represent the same account, combining the first and second accounts into a single account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-based method of generating a common account, one account being associated with a node, the method comprising:
-
receiving at the node information relating to an account; and
when the account to which the information is related is not currently associated with the node, determining whether the account associated with the node and the node not currently associated with the node should be common accounts; and
when it is determined that the accounts should be common accounts, directing the combining the accounts into a single account. - View Dependent Claims (11, 12, 13, 14, 15, 17, 18, 20, 21, 22, 23, 24, 25, 26, 28, 29)
-
-
16. A method in a computer system for identifying common accounts, the method comprising:
-
receiving a user identifier from a user;
sending a log on request to a server computer, the request including the received user identifier, but not including an account identifier;
receiving a log on response from the server, the response including an account identifier associated with the received user identifier; and
when the received account identifier does not match an account identifier previously stored at the node, prompting the user to indicate whether the account identified by the received account identifier should be the same account as an account identified by an account identifier previously stored at the node.
-
-
19. A method in a computer system for authorizing access to applications, each application having an application identifier, the method comprising:
-
receiving a plurality of user identifier and application identifier pairs;
for each pair received, storing the user identifier in association with the application identifier;
receiving a request to access an application, the request including a user identifier and application identifier pair, the application identifier identifying the application to be accessed; and
when the user identifier and application identifier pair of the request match a stored user identifier and application identifier pair, indicating that access to the application is authorized.
-
-
27. A method in a computer system for authorizing access to different applications, each application having an application identifier, the method comprising:
-
receiving a plurality of user identifier and application identifier pairs; and
for each pair received, sending the received user identifier and application identifier pair to an authorization system;
receiving from the authorization system an indication whether access to the application identified by the application identifier is authorized.
-
-
30. A method in a computer system for authorizing access to a resource, each resource having a resource identifier, the method comprising:
-
providing a plurality of user identifier and resource identifier pairs, each user identifier and resource identifier pair indicating that the identified user is authorized to access the identified resource;
receiving a request to access a resource, the request including a user identifier and resource identifier pair, the resource identifier identifying the resource to be accessed; and
when the user identifier and resource identifier pair of the received request match a provided user identifier and resource identifier pair, indicating that access to the resource is authorized. - View Dependent Claims (31, 32, 33, 34, 36, 37, 38, 39, 40, 41, 42)
-
-
35. A method in a computer system for managing accounts, the method comprising:
-
assigning an account to a node;
receiving from the node a request to access a computer resource that is associated with an account that is not assigned to the node; and
in response to receiving the request, assigning the account associated with the computer resource to the node so that the computer resource can be accessed from the node.
-
-
43. A method in a computer system accessing a computer resource, the method comprising:
-
assigning a different account to each of a plurality of nodes;
receiving from a node a notification that a user has requested to access a computer resource that is associated with an account that is assigned to another node; and
in response to receiving the notification, temporarily assigning the account associated with the computer resource to the node so that the user can access the computer resource from the node. - View Dependent Claims (44, 45, 47, 48, 50)
-
-
46. A method in a computer system for tracking use of applications, the method comprising:
-
receiving from a client computer a request to access an application, the requests including an application identifier and user identifier;
determining whether the user identifier is associated with an account;
when the user identifier is associated with an account, sending to an authorization computer a request to authorize access to the application, the request including the user identifier; and
upon receiving a response indicating that access is authorized, sending to the client computer a response indicating that access is authorized.
-
-
49. A method in a computer system for managing account, the method comprising:
-
receiving a plurality of user identifiers;
associating the user identifiers with a single account;
receiving attributes when a user is logged on with one of the user identifiers associated with the single account; and
providing those received attributes when a user is logged on with another of the user identifiers associated with the single account.
-
-
52. A computer-readable medium containing instructions for causing a computer system to generate common account, one account being associated with a node, by a method comprising:
-
receiving at the node information relating to an account; and
when the account to which the information is related is not currently associated with the node, determining whether the account associated with the node and the node not currently associated with the node should be common accounts; and
when it is determined that the accounts should be common accounts, directing the combining the accounts into a single account. - View Dependent Claims (51, 53, 54, 55, 56, 57, 59, 60, 61, 62, 63)
-
-
58. A computer system for generating a common account, one account being associated with a node, comprising:
-
means for receiving at the node information relating to an account; and
means for, when the account to which the information is related is not currently associated with the node, determining whether the account associated with the node and the node not currently associated with the node should be common accounts; and
when it is determined that the accounts should be common accounts, directing the combining the accounts into a single account.
-
-
64. A computer-readable medium containing instructions for controlling a computer system to authorize access to different applications, each application having an application identifier, by a method comprising:
-
receiving a plurality of user identifier and application identifier pairs; and
for each pair received, sending the received user identifier and application identifier pair to an authorization system;
receiving from the authorization system an indication whether access to the application identified by the application identifier is authorized. - View Dependent Claims (65, 66, 68, 69, 70, 71)
-
-
67. A computer-readable medium for controlling a computer system to authorize access to a resource, each resource having a resource identifier, by a method comprising:
-
providing a plurality of user identifier and resource identifier pairs, each user identifier and resource identifier pair indicating that the identified user is authorized to access the identified resource;
receiving a request to access a resource, the request including a user identifier and resource identifier pair, the resource identifier identifying the resource to be accessed; and
when the user identifier and resource identifier pair of the received request match a provided user identifier and resource identifier pair, indicating that access to the resource is authorized.
-
-
72. A method in a client computer for coordinating registration of a user with a server computer, comprising:
-
receiving a user identifier and an indication that the user is a new user;
when the client computer has previously cached that user identifier, prompting the user to indicate whether the user is the same as the user associated with the previously cached user identifier;
when the user indicates that the user is not the same, allowing the user to enter a new user identifier; and
when the user indicates that the user is the same user, coordinating log on of the user; and
when the client computer has not previously cached that user identifier, registering the user;
when the registration is successful, caching the user identifier and coordinating log on of the user.
-
-
73. A method in a client computer for log on of a user, comprising:
-
receiving a user identifier and password;
sending a log on request to a server computer, the request including an account identifier when the client computer has an account identifier associated with the received user identifier;
when a response indicating that the log on was successful is received, the response including an account identifier, when the account identifier does not match an account identifier previously cached at the client computer, prompting the user whether the received account identifier and a previously cached account identifier represent the same account; and
when the user indicates that the accounts represent the same account, combining the accounts.
-
Specification