Resource authorization
First Claim
Patent Images
1. A method comprising:
- receiving a resource request from a first requester, the resource request including credentials and identifying an operation to be performed with respect to a resource;
mapping the resource request to a resource identifier;
searching a resource data structure for a resource node based on the resource identifier; and
determining whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization parameter associated with the resource node.
1 Assignment
0 Petitions
Accused Products
Abstract
Resource authorization includes receiving a resource request from a first requester. The resource request includes credentials and identifies an operation to be performed with respect to a resource. The resource request is mapped to a resource identifier, and the resource data structure is searched for a resource node based on the resource identifier. A determination is made whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization level associated with the resource node.
98 Citations
30 Claims
-
1. A method comprising:
-
receiving a resource request from a first requester, the resource request including credentials and identifying an operation to be performed with respect to a resource;
mapping the resource request to a resource identifier;
searching a resource data structure for a resource node based on the resource identifier; and
determining whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization parameter associated with the resource node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 18, 19)
-
-
12. An apparatus comprising:
-
a memory for storing a resource data structure having resource nodes each of which represents a respective resource and which has a respective resource identifier and a resource authorization parameter; and
a processor configured to;
receive a resource request from a first requester, the resource request including credentials and identifying an operation to be performed with respect to a resource;
map the resource request to a resource identifier;
search the resource data structure for a resource node based on the resource identifier; and
determine whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization parameter associated with the resource node.
-
-
20. A system comprising:
-
a first computer associated with a first requester configured to generate resource requests with credentials;
a second computer including memory storing a resource data structure with resource nodes each of which represents a respective resource and which has a respective resource identifier and a resource authorization level, and the second computer configured to;
receive a resource request from a first requester, the resource request including credentials and identifying an operation to be performed with respect to a resource;
map the resource request to a resource identifier;
search the resource data structure for a resource node based on the resource identifier; and
determine whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization level associated with the resource node; and
a network over which the first and second computers communicate. - View Dependent Claims (21, 22, 23, 24, 25, 27, 28, 29, 30)
-
-
26. An article comprising a computer readable medium that stores computer executable instructions for causing a computer system to:
-
map a resource request to a resource identifier, in response to receiving the resource request from a first requester, the resource request including credentials and identifying an operation to be performed with respect to a resource;
search a resource data structure for a resource node based on the resource identifier; and
determine whether the first requester is authorized to perform the operation with respect to the resource based on whether the credentials in the resource request match a resource authorization level associated with the resource node.
-
Specification