Proxy system
First Claim
Patent Images
1. A method for allowing proxies in an Identity System, comprising the steps of:
- receiving a request for a first entity to be a proxy for a second entity;
associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and
allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to technology for using a proxy in an Identity System. When a first entity is on vacation, on a business trip or otherwise unavailable to perform certain actions on an Identity System, a second entity can act as a proxy for the first entity. The Identity System will provide the second entity, acting as a proxy, with the privileges, access and rights of the first entity. In one embodiment, Identity System is part of an integrated Identity and Access System, and the second entity is a proxy in the Identity System but not in the Access System.
111 Citations
49 Claims
-
1. A method for allowing proxies in an Identity System, comprising the steps of:
-
receiving a request for a first entity to be a proxy for a second entity;
associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and
allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27, 28, 29, 30, 31)
-
-
24. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving a request for a first entity to be a proxy for a second entity;
associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and
allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity.
-
-
32. An apparatus that allows for proxies in an Identity System, comprising:
-
one or more communication interfaces;
one or more storage devices; and
one or more processors in communication with said one or more storage devices and said one or more communication interfaces, said processor performs a method comprising the steps of;
receiving a request for a first entity to be a proxy for a second entity, associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity, and allowing said first entity to use said Identity System as said second entity based on said one or more credentials of said second entity. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39)
-
-
40. A method for allowing proxies in a system, comprising the steps of:
-
receiving an indication that a first entity can be a proxy for a second entity, said indication is from said second entity;
receiving an indication from said first entity to become said proxy for said second entity;
associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and
allowing said first entity to use said system as said second entity based on said one or more credentials of said second entity. - View Dependent Claims (41, 42, 43, 44, 46, 47, 48, 49)
-
-
45. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving an indication that a first entity can be a proxy for a second entity, said indication is from said second entity;
receiving an indication from said first entity to become said proxy for said second entity;
associating said first entity with one or more credentials of said second entity without authenticating said first entity as said second entity; and
allowing said first entity to use said system as said second entity based on said one or more credentials of said second entity.
-
Specification