Method and system for providing access to computer resources
First Claim
1. A method for providing access to computer resources on a computer system, comprising:
- generating a token containing encrypted user information including credit, authorization, and authentication information;
initiating a request to open a computer resource stored on the computer system, the computer resource being encrypted;
initiating execution of a remote application manager component on the computer system;
under control of the remote application manager component, decrypting the token and authenticating a user of the computer system using authentication information stored in the token;
verifying whether the user is authorized to use the requested computer resource using authorization information stored in the token;
verifying whether the user has sufficient credit contained in the token to use the requested computer resource using credit information stored in the token;
when the user is authenticated, authorized, and has sufficient credit, decrypting and opening the requested computer resource;
monitoring the usage of the opened computer resource to determine whether the user has sufficient credit to continue using the computer resource; and
providing a notification when the monitored usage of the opened computer resource has exceeded the credit.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and computer system for providing access to computer resources on a computer system and includes generating a token containing encrypted user information including credit, authorization, and authentication information. A request is initiated to open an encrypted computer resource stored on the computer system, and execution of a remote application manager component on the computer system is also initiated. The remote application manager component decrypts the token and authenticates a user using authentication information stored in the token. Whether the user is authorized and has sufficient credit are then verified. When the user is approved, the requested computer resource is decrypted and opened. Use of the computer resource is monitored to determine whether the user has sufficient credit to continue using the computer resource. A notification is provided when the monitored usage of the opened computer resource has exceeded the credit.
-
Citations
34 Claims
-
1. A method for providing access to computer resources on a computer system, comprising:
-
generating a token containing encrypted user information including credit, authorization, and authentication information;
initiating a request to open a computer resource stored on the computer system, the computer resource being encrypted;
initiating execution of a remote application manager component on the computer system;
under control of the remote application manager component, decrypting the token and authenticating a user of the computer system using authentication information stored in the token;
verifying whether the user is authorized to use the requested computer resource using authorization information stored in the token;
verifying whether the user has sufficient credit contained in the token to use the requested computer resource using credit information stored in the token;
when the user is authenticated, authorized, and has sufficient credit, decrypting and opening the requested computer resource;
monitoring the usage of the opened computer resource to determine whether the user has sufficient credit to continue using the computer resource; and
providing a notification when the monitored usage of the opened computer resource has exceeded the credit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing access to computer resources on a computer system, comprising:
-
under control of a client system, providing user information to a server system, the user information including authentication, authorization, and credit information for a user of the client system;
receiving from the server system, a token including encrypted information generated from the user information provided by the client system;
a remote application manager component;
at least one computer resource, each computer resource being encrypted and the particular computer resources received being determined from the authorization information contained in the provided user information;
under control of the remote application manager component on the client system, decrypting the token in response to a request to initiate execution of one of the computer resources;
authenticating the user of the client computer system;
verifying whether the user is authorized to use the requested computer resource;
verifying whether the user has sufficient credit contained in the token to use the requested computer resource;
when the user is authenticated, authorized, and has sufficient credit, decrypting and initiating execution of the requested computer resource; and
monitoring the usage of the executing computer resource and providing a notification when the monitored usage has exceeded the user'"'"'s credit. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for providing access to computer resources on a computer system including client and server systems, comprising:
-
under control of a client system, providing user information to a server system, the user information including authentication, authorization, and credit information for a user of the client system;
under control of a server system, generating a token including encrypted information generated from the user information provided by the client system;
sending the token to the client system;
sending a remote application manager component to the client system;
sending at least one computer resource to the client system, each computer resource that is sent being encrypted;
under control of the remote application manager component on the client system, initiating execution of the remote application manager component in response to a request to initiate execution of the computer resource;
decrypting the token and authenticating a user of the client computer system;
verifying whether the user is authorized to use the computer resource;
verifying whether the user has sufficient credit contained in the token to use the computer resource;
when the user is authenticated, authorized, and has sufficient credit, decrypting and initiating execution of the computer resource; and
monitoring the usage of the executing computer resource and providing notification when the monitored usage has exceeded the user'"'"'s credit. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. A client system for providing access to computer resources, comprising:
-
a token component including encrypted user information, the user information including authentication, authorization, and credit information for a user of the client system;
at least one computer resource component, each computer resource component being encrypted;
a remote application manager component being adapted to receive the encrypted user information contained in the token, the remote application manager component operable responsive to a request to open a computer resource component to decrypt the encrypted user information, authenticate the user, determine whether the user is authorized to use the requested computer resource, and determine whether the user has sufficient credit to use the requested computer resource, the remote application manager component decrypting and opening the requested computer resource when the user is authenticated, authorized, and has sufficient credit, and monitoring the usage of the opened computer resource and providing a notification when the monitored usage has exceeded the user'"'"'s credit. - View Dependent Claims (28, 29, 30)
-
-
31. A server system for providing access to computer resources, comprising:
-
a token generation component that is operable to receive user information including user authentication, authorization, and credit information, and operable to use the received user information in generating a token including encrypted user information;
a computer resource component including a plurality of computer resources; and
an accounting and billing component that is operable to receive user credit information and to verify user credit based upon such received information, the accounting and billing component providing a credit approval output indicating the results of the credit verification; and
a client interface component that is operable to receive client requests from client computers and to provide credit information contained in such requests to the accounting and billing component, and when the credit approval output indicates the user'"'"'s credit has been approved the client interface component providing credit and user information to the token generation component and receiving the generated token from the token generation component, the client interface component further operable to select computer resources using information contained in the client requests and to encrypt each selected computer resource, the client interface module transferring the token and the encrypted selected computer resources to the client computer along with a remote application manager component. - View Dependent Claims (32, 33, 34)
-
Specification