×

SOFTWARE APPLICATION ACCESS METHOD AND SYSTEM

  • US 20080289021A1
  • Filed: 05/17/2007
  • Published: 11/20/2008
  • Est. Priority Date: 05/17/2007
  • Status: Active Grant
First Claim
Patent Images

1. An access method comprising:

  • receiving from a first user, by a software application within a computing system, a first request for access to said software application, said computing system comprising a memory device, said memory device comprising data;

    determining, by said software application, a first domain associated with a first current location of said first user, said first domain associated with a first set of login process rules and a first set of software application access rules;

    first enforcing, by said software application, said first set of login process rules;

    presenting based on said first enforcing, by said software application, a first specified login procedure for said first user;

    receiving, by said software application, first login information from said first user in response to said first specified login procedure, said first login information comprising an identity for said first user;

    first authenticating, by said software application, said first user based on said first login information;

    determining, by said software application, a home domain associated with said first user, said home domain associated with a second set of login process rules and a second set of software application access rules, said home domain different from said first domain, said home domain associated with said first user and a first entity, said first domain associated with a second entity, said first entity different from said second entity, said software application associated with said first entity and said second entity;

    retrieving, by said software application, a third set of login process rules from said data, said third set of login process rules associated with a combination of said first domain and said home domain, said third set of login process rules different from said second set of login process rules and said first set of login process rules; and

    second enforcing, by said software application, said third set of login process rules;

    transmitting to said first user, by said software application, results of said second enforcing.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×