Peer-to-peer authorization method
First Claim
1. A method for establishing a peer-to-peer relationship enabling a remote peer on a peer-to-peer network to access a resource, comprising:
- receiving a request from a remote peer to access a resource;
accessing one or more security identification values, the one or more security identification values representing respectively one or more access rights of the remote peer in an access control system;
generating an access token for the access control system, the access token comprising the one or more security identification values; and
accessing the resource on behalf of the remote peer, the access control system determining the level of access to the resource based on said one or more access security identification values in said token.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are peer-to-peer computer program products, methods, and systems in which a remote peer on a peer-to-peer network is granted or denied access to a resource based on the credentials presented by the remote peer. In accordance with the disclosed subject matter, an access token that includes one or more security identification values which represent respectively one or more access rights in an access control system is generated. An execution thread that is associated with the access token thus generated attempts to access the resource on behalf of the remote peer. In some embodiments, the access control system includes a generic user account, and the access token that is generated for the remote peer includes the security identification value associated with the generic user account in the access control system.
98 Citations
47 Claims
-
1. A method for establishing a peer-to-peer relationship enabling a remote peer on a peer-to-peer network to access a resource, comprising:
-
receiving a request from a remote peer to access a resource;
accessing one or more security identification values, the one or more security identification values representing respectively one or more access rights of the remote peer in an access control system;
generating an access token for the access control system, the access token comprising the one or more security identification values; and
accessing the resource on behalf of the remote peer, the access control system determining the level of access to the resource based on said one or more access security identification values in said token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for use on a computer connected to at least one other computer in a peer-to-peer networking environment, the computer having an access control system for determining the level of access to a resource based on one or more security identification values in an access token associated with an execution thread attempting to access the resource, the computer program product comprising:
-
code for receiving a request to access a resource from a remote peer;
code for accessing one or more security identification values which represent respectively one or more access rights of the remote peer in the access control system;
code for generating an access token for use in conjunction with the access control system, the access token comprising the one or more security identification values; and
code for accessing the resource on behalf of the remote peer. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A computer program product comprising a computer readable medium having a computer executable program code disposed thereon, the code comprising;
-
access control system code for determining the level of access to a resource based upon one or more security identification values in an access token;
code for receiving a request to access a resource from a remote peer on a peer-to-peer network;
code for accessing one or more security identification values, the one or more security identification values representing respectively one or more access rights of the remote peer for use in conjunction with the access control system;
code for generating an access token, the access token including the one or more security identification values for use in conjunction with the access control system; and
code for accessing the resource on behalf of the remote peer.
-
-
24. A computer program product for use on a computer connected to at least one other computer in a peer-to-peer networking environment, the computer having an access control system for determining the level of access to a resource based on one or more security identification value in an access token associated with an execution thread attempting to access the resource, the computer program product comprising:
-
installation code for placing computer-readable program code onto a medium readable by the computer, the computer readable program code comprising;
code for receiving a request to access a resource from a remote peer;
code for accessing one or more security identification values which represent respectively one or more access rights of the remote peer in the access control system;
code for generating an access token for use in conjunction with the access control system, the access token comprising the one or more security identification value; and
code for accessing the resource on behalf of the remote peer. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
-
31. A computer program product comprising a computer-readable medium having computer executable program code disposed thereon, the code comprising:
-
installation code for placing computer-readable program code onto a medium readable by the computer, the computer readable program code comprising;
access control system code for determining the level of access to a resource based upon one or more security identification value in an access token;
code for receiving a request to access a resource from a remote peer on a peer-to-peer network;
code for accessing one or more security identification values, the one or more security identification values representing respectively one or more access rights of the remote peer for use in conjunction with the access control system;
code for generating an access token comprising the one or more security identification values for use in conjunction with the access control system; and
code for accessing the resource on behalf of the remote peer.
-
-
32. A computer having a computer program executing thereon, the computer program comprising executing computer-readable program code, the computer-readable code comprising:
-
code for receiving a request to access a resource from a remote peer;
code for accessing one or more security identification values which represent respectively one or more access rights of the remote peer in the access control system;
code for generating an access token for use in conjunction with the access control system, the access token comprising the one or more security identification values; and
code for initiating an execution thread for accessing the resource on behalf of the peer, the execution thread being associated with the access token. - View Dependent Claims (33, 34, 35, 36, 37, 38)
-
-
39. A computer having a computer program executing thereon, the computer program comprising executing computer-readable program code, the computer-readable code comprising:
-
access control system code for determining the level of access to a resource based upon one or more security identification values in an access token;
code for receiving a request to access a resource from a remote peer on a peer-to-peer network;
code for accessing one or more security identification values, the one or more security identification values representing respectively one or more access rights of the remote peer for use in conjunction with the access control system;
code for generating an access token comprising the one or more security identification values for use in conjunction with the access control system; and
code for accessing the resource on behalf of the remote peer.
-
-
40. A computer system comprising a peer-to-peer network, the peer-to-peer network comprising a plurality of computers, each of the computers being connected to at least one other computer on the peer-to-peer network, at least one of the computers having program code disposed on a medium readable by the computer, the program code comprising:
-
code for receiving a request to access a resource from a remote peer;
code for accessing one or more security identification values which represent respectively one or more access rights of the remote peer in the access control system;
code for generating an access token for use in conjunction with the access control system, the access token comprising the one or more security identification values; and
code for accessing the resource on behalf of the remote peer. - View Dependent Claims (41, 42, 43, 44, 45, 46)
-
-
47. A computer system comprising a peer-to-peer network, the peer-to-peer network comprising a plurality of computers, each of the computers being connected to at least one other computer on the peer-to-peer network, at least one of the computers having program code disposed on a medium readable by the computer, the program code comprising:
-
access control system code for determining the level of access to a resource based upon one or more security identification values in an access token;
code for receiving a request to access a resource from a remote peer on a peer-to-peer network;
code for accessing one or more security identification values, the one or more security identification values representing respectively one or more access rights of the remote peer for use in conjunction with the access control system;
code for generating an access token comprising the one or more security identification values for use in conjunction with the access control system; and
code for accessing the resource on behalf of the remote peer.
-
Specification