Matching entitlement information for multiple sources
First Claim
1. A computer-implementable method comprising:
- receiving, at an External Client Application (ECA) that regulates access to protected computer resources, a request from a requesting user for a protected computer resource, wherein the protected computer resource is available only to entitled users;
sending, from an External Authentication Application (EAA) to an Entitlement Broker Service (EBS), an entitlement credential identifying one or more entitled users who are entitled to access the protected computer resource;
sending, from the EBS to an Entitlement Source (ES), a request for entitlement information for the requesting user based on the entitlement credential for the requesting user;
transmitting, from the ES to the EBS, the entitlement information for the requesting user; and
transmitting the entitlement information, for the requesting user, from the EBS to the ECA, wherein the requesting user is able to access the protected computer resource according to information in the entitlement information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus and computer-usable medium for executing, at an Entitlement Broker Service (EBS), a request from a requesting user for a protected computer resource that is available only to entitled users. Entitlement identifications are located using a Standardized Entitlement Credentials Data Store (SECDS) in the EBS. The SECDS contains entitlement identification in a standardized format that can be used to contact an Entitlement Source (ES) for entitlement information regarding the requesting user and the requested protected computer resource. The located entitlement information, for the requesting user, is then transmitted from the EBS to an External Client Application (ECA) that manages the protected computer resource, thus affording the requesting user access to the protected computer resource.
-
Citations
20 Claims
-
1. A computer-implementable method comprising:
-
receiving, at an External Client Application (ECA) that regulates access to protected computer resources, a request from a requesting user for a protected computer resource, wherein the protected computer resource is available only to entitled users;
sending, from an External Authentication Application (EAA) to an Entitlement Broker Service (EBS), an entitlement credential identifying one or more entitled users who are entitled to access the protected computer resource;
sending, from the EBS to an Entitlement Source (ES), a request for entitlement information for the requesting user based on the entitlement credential for the requesting user;
transmitting, from the ES to the EBS, the entitlement information for the requesting user; and
transmitting the entitlement information, for the requesting user, from the EBS to the ECA, wherein the requesting user is able to access the protected computer resource according to information in the entitlement information. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor;
a data bus coupled to the processor;
a memory coupled to the data bus; and
a computer-usable medium embodying computer program code, the computer program code comprising instructions executable by the processor and configured to;
receive, at an External Client Application (ECA) that regulates access to protected computer resources, a request from a requesting user for a protected computer resource, wherein the protected computer resource is available only to entitled users;
send, from an External Authentication Application (EAA) to an Entitlement Broker Service (EBS), an entitlement credential identifying one or more entitled users who are entitled to access the protected computer resource;
send, from the EBS to an Entitlement Source (ES), a request for entitlement information for the requesting user based on the entitlement credential for the requesting user;
transmit, from the ES to the EBS, the entitlement information for the requesting user; and
transmit the entitlement information, for the requesting user, from the EBS to the ECA, wherein the requesting user is able to access the protected computer resource according to information in the entitlement information. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-usable medium embodying computer program code, the computer program code comprising computer executable instructions configured to:
-
receive, at an External Client Application (ECA) that regulates access to protected computer resources, a request from a requesting user for a protected computer resource, wherein the protected computer resource is available only to entitled users;
send, from an External Authentication Application (EAA) to an Entitlement Broker Service (EBS), an entitlement credential identifying one or more entitled users who are entitled to access the protected computer resource;
send, from the EBS to an Entitlement Source (ES), a request for entitlement information for the requesting user based on the entitlement credential for the requesting user;
transmit, from the ES to the EBS, the entitlement information for the requesting user; and
transmit the entitlement information, for the requesting user, from the EBS to the ECA, wherein the requesting user is able to access the protected computer resource according to information in the entitlement information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification