Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information
First Claim
1. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
- receiving a request from the at least one user identifying one of the plurality of computer resources;
from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, selecting one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and
using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for providing a user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information. A request is received from the user identifying one of the plurality of computer resources. From a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, one of the records of the set is selected whose identification of one of the plurality of computer resources best matches the request'"'"'s identification of one of the plurality of computer resources. The security information in the selected record is used to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
Citations
22 Claims
-
1. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user identifying one of the plurality of computer resources;
from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, selecting one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and
using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user containing one or more values which identify one of the plurality of computer resources;
from a set of previously stored records each of which contains one or more values that identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, selecting one of the records of the set by comparing, for each record of the set, the one or more values from the record with the one or more values from the request to determine the number of matching values and choosing the record having the highest number of matching values; and
using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
-
7. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user containing one or more values which identify one of the plurality of computer resources;
from a set of previously stored records each of which contains one or more values that identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, selecting one of the records of the set by comparing, for each record of the set, the one or more values from the record with the one or more values from the request to determine the number of consecutive matching values and selecting the record having the highest number of consecutive matching values; and
using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
-
8. A system for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the system comprising:
-
a security interface in communication with the at least one user;
a resource interface in communication with each of the plurality of computer resources and capable of operating according the distinct protocol utilized by each computer resource; and
a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record;
wherein upon receiving a request from the at least one user identifying one of the plurality of computer resources, the security interface selects one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources and causes the resource interface to use the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the system comprising:
-
means for receiving a request from the at least one user identifying one of the plurality of computer resources;
means for selecting, from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and
means for using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (14, 15)
-
-
16. A data structure for storing information to be utilized in providing a plurality of users with access to a plurality of computer resources, the data structure comprising:
-
a location for storing an identification of one of the plurality of users;
a location for storing an identification of one of the plurality of computer resources; and
a location for storing security information for allowing the identified user to access the identified computer resource. - View Dependent Claims (17)
-
-
18. A computer program product comprising a computer usable medium having computer readable code embodied therein, the computer readable code, when executed, causing a computer to implement a method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user identifying one of the plurality of computer resources;
selecting, from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and
using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (19, 20, 21, 22)
-
Specification