Dynamic binding of access and usage rights to computer-based resources
First Claim
1. A computer program product, tangibly embodied in a computer-readable media, the computer program product comprising instructions to cause data processing apparatus to perform operations comprising:
- receiving data characterizing a request for content, the content being secured with a first security against access by a user;
determining whether first security credentials authenticate the user; and
replacing the first security of the content with a second security if the user is authenticated by the first security credentials and authorized to use the content, the replacing comprising removing the first security in accordance with second security credentials and the replacing to enable the user to perform actions to the content.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus, including computer program products, related to dynamic binding of access and usage rights to a computer-based resource. In general, data characterizing a request for content is received, a determination as to whether first security credentials authenticate a user is made, and, if so and the user is authorized to access or use the content, security is of the content is replaced. Replacing security may involve removing the security from the content in accordance with second security credentials. The removal of security may enable the user to perform actions to the content. The removal of security may be followed with an addition of security of a second type such that content is moved from a first trusted environment to a second trusted environment.
-
Citations
20 Claims
-
1. A computer program product, tangibly embodied in a computer-readable media, the computer program product comprising instructions to cause data processing apparatus to perform operations comprising:
-
receiving data characterizing a request for content, the content being secured with a first security against access by a user; determining whether first security credentials authenticate the user; and replacing the first security of the content with a second security if the user is authenticated by the first security credentials and authorized to use the content, the replacing comprising removing the first security in accordance with second security credentials and the replacing to enable the user to perform actions to the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method comprising:
-
receiving data characterizing a request for content, the content being secured with a first security against access by a user; determining whether first security credentials authenticate the user; and replacing the first security of the content with a second security if the user is authenticated by the first security credentials and authorized to use the content, the replacing comprising removing security from the content in accordance with second security credentials and the replacing to enable the user to perform actions to the content. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer program product, tangibly embodied in a computer-readable media, the computer program product comprising instructions to cause data processing apparatus to perform operations comprising:
-
receiving at a server data characterizing a request for content, the content being secured with a first security against access by a client of a user; determining whether first security credentials authenticate the user; and if the user is authenticated by the first security credentials and authorized to use the content, replacing the first security of the content with a second security, the replacing comprising removing security from the content in accordance with second security credentials; and authorizing the user to perform at least one action of a plurality of types of actions, the at least one action being associated with the user at the server. - View Dependent Claims (19, 20)
-
Specification