SYSTEMS AND METHODS FOR DELEGATING INFORMATION TECHNOLOGY AUTHORIZATION TO AT LEAST ONE OTHER PERSON
First Claim
1. A system for delegating authorization relating to an information technology resource, the system comprising:
- a processor;
memory in electronic communication with the processor;
a user database stored in the memory, wherein the user database includes a plurality of user identifications, and wherein the user database further comprises trusted circle data;
instructions stored in the memory, the instructions being executable to;
add a new user to the trusted circle data;
provide a user interface for the new user wherein the new user is capable of resetting a password for an account owner or of reinstating an account for the account owner.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for delegating authorization relating to an information technology resource is described. The system includes a processor and memory in electronic communication with the processor. A user database is stored in the memory. The user database includes a plurality of user identifications and trusted circle data. Instructions are stored in the memory and are executable to add a new user to the trusted circle data and to provide a user interface for the new user so that the new user is capable of resetting a password for an account owner or of reinstating an account for the account owner.
-
Citations
10 Claims
-
1. A system for delegating authorization relating to an information technology resource, the system comprising:
-
a processor;
memory in electronic communication with the processor;
a user database stored in the memory, wherein the user database includes a plurality of user identifications, and wherein the user database further comprises trusted circle data;
instructions stored in the memory, the instructions being executable to;
add a new user to the trusted circle data;
provide a user interface for the new user wherein the new user is capable of resetting a password for an account owner or of reinstating an account for the account owner. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for delegating authorization relating to an information technology resource, the method comprising:
-
adding a plurality of user identifications to a user database being stored on a computing device, and wherein the user database further comprises trusted circle data;
adding a new user to the trusted circle data;
providing a user interface for the new user wherein the new user is capable of resetting a password for an account owner or of reinstating an account for the account owner, wherein the new user and the account owner are not the same user; and
resetting the password for the account owner by the new user. - View Dependent Claims (7, 8, 9, 10)
-
Specification