SOFTWARE APPLICATION ACCESS METHOD AND SYSTEM
First Claim
1. An access method comprising:
- receiving from a first user, by a software application within a computing system, a first request for access to said software application, said computing system comprising a memory device, said memory device comprising data;
determining, by said software application, a first domain associated with a first current location of said first user, said first domain associated with a first set of login process rules and a first set of software application access rules;
first enforcing, by said software application, said first set of login process rules;
presenting based on said first enforcing, by said software application, a first specified login procedure for said first user;
receiving, by said software application, first login information from said first user in response to said first specified login procedure, said first login information comprising an identity for said first user;
first authenticating, by said software application, said first user based on said first login information;
determining, by said software application, a home domain associated with said first user, said home domain associated with a second set of login process rules and a second set of software application access rules, said home domain different from said first domain, said home domain associated with said first user and a first entity, said first domain associated with a second entity, said first entity different from said second entity, said software application associated with said first entity and said second entity;
retrieving, by said software application, a third set of login process rules from said data, said third set of login process rules associated with a combination of said first domain and said home domain, said third set of login process rules different from said second set of login process rules and said first set of login process rules; and
second enforcing, by said software application, said third set of login process rules;
transmitting to said first user, by said software application, results of said second enforcing.
1 Assignment
0 Petitions
Accused Products
Abstract
An access method and system. The method includes receiving from a first user, by a software application within a computing system, a request for access to the software application. The software application determines a first domain associated with a first current location of the user. The software application determines a home domain associated with the user. The software application retrieves a set of login process rules associated with a combination of the first domain and the home domain. The software application enforces the set of login process rules. The software application transmits results of enforcing the set of login process rules.
32 Citations
28 Claims
-
1. An access method comprising:
-
receiving from a first user, by a software application within a computing system, a first request for access to said software application, said computing system comprising a memory device, said memory device comprising data; determining, by said software application, a first domain associated with a first current location of said first user, said first domain associated with a first set of login process rules and a first set of software application access rules; first enforcing, by said software application, said first set of login process rules; presenting based on said first enforcing, by said software application, a first specified login procedure for said first user; receiving, by said software application, first login information from said first user in response to said first specified login procedure, said first login information comprising an identity for said first user; first authenticating, by said software application, said first user based on said first login information; determining, by said software application, a home domain associated with said first user, said home domain associated with a second set of login process rules and a second set of software application access rules, said home domain different from said first domain, said home domain associated with said first user and a first entity, said first domain associated with a second entity, said first entity different from said second entity, said software application associated with said first entity and said second entity; retrieving, by said software application, a third set of login process rules from said data, said third set of login process rules associated with a combination of said first domain and said home domain, said third set of login process rules different from said second set of login process rules and said first set of login process rules; and second enforcing, by said software application, said third set of login process rules; transmitting to said first user, by said software application, results of said second enforcing. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computing system comprising a processor coupled to a computer-readable memory unit, said memory unit comprising data, a software application, and instructions that when executed by the processor implement an access method, said method comprising:
-
receiving from a first user, by said software application, a first request for access to said software application; determining, by said software application, a first domain associated with a first current location of said first user, said first domain associated with a first set of login process rules and a first set of software application access rules; first enforcing, by said software application, said first set of login process rules; presenting based on said first enforcing, by said software application, a first specified login procedure for said first user; receiving, by said software application, first login information from said first user in response to said first specified login procedure, said first login information comprising an identity for said first user; first authenticating, by said software application, said first user based on said first login information; determining, by said software application, a home domain associated with said first user, said home domain associated with a second set of login process rules and a second set of software application access rules, said home domain different from said first domain, said home domain associated with said first user and a first entity, said first domain associated with a second entity, said first entity different from said second entity, said software application associated with said first entity and said second entity; retrieving, by said software application, a third set of login process rules from said data, said third set of login process rules associated with a combination of said first domain and said home domain, said third set of login process rules different from said second set of login process rules and said first set of login process rules; and second enforcing, by said software application, said third set of login process rules; transmitting to said first user, by said software application, results of said second enforcing. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A process for supporting computer infrastructure, said process comprising providing at least one support service for at least one of creating, integrating, hosting, maintaining, and deploying computer-readable code in a computing system, wherein the code in combination with the computing system is capable of performing an access method, said method comprising:
-
receiving from a first user, by a software application within said computing system, a first request for access to said software application, said computing system comprising a memory device, said memory device comprising data; determining, by said software application, a first domain associated with a first current location of said first user, said first domain associated with a first set of login process rules and a first set of software application access rules; first enforcing, by said software application, said first set of login process rules; presenting based on said first enforcing, by said software application, a first specified login procedure for said first user; receiving, by said software application, first login information from said first user in response to said first specified login procedure, said first login information comprising an identity for said first user; first authenticating, by said software application, said first user based on said first login information; determining, by said software application, a home domain associated with said first user, said home domain associated with a second set of login process rules and a second set of software application access rules, said home domain different from said first domain, said home domain associated with said first user and a first entity, said first domain associated with a second entity, said first entity different from said second entity, said software application associated with said first entity and said second entity; retrieving, by said software application, a third set of login process rules from said data, said third set of login process rules associated with a combination of said first domain and said home domain, said third set of login process rules different from said second set of login process rules and said first set of login process rules; and second enforcing, by said software application, said third set of login process rules; transmitting to said first user, by said software application, results of said second enforcing. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A computer program product, comprising a computer usable medium comprising data and a computer readable program code embodied therein, said computer readable program code adapted to implement an access within a computing system, said method comprising:
-
receiving from a first user, by a software application within said computing system, a first request for access to said software application; determining, by said software application, a first domain associated with a first current location of said first user, said first domain associated with a first set of login process rules and a first set of software application access rules; first enforcing, by said software application, said first set of login process rules; presenting based on said first enforcing, by said software application, a first specified login procedure for said first user; receiving, by said software application, first login information from said first user in response to said first specified login procedure, said first login information comprising an identity for said first user; first authenticating, by said software application, said first user based on said first login information; determining, by said software application, a home domain associated with said first user, said home domain associated with a second set of login process rules and a second set of software application access rules, said home domain different from said first domain, said home domain associated with said first user and a first entity, said first domain associated with a second entity, said first entity different from said second entity, said software application associated with said first entity and said second entity; retrieving, by said software application, a third set of login process rules from said data, said third set of login process rules associated with a combination of said first domain and said home domain, said third set of login process rules different from said second set of login process rules and said first set of login process rules; and second enforcing, by said software application, said third set of login process rules; transmitting to said first user, by said software application, results of said second enforcing. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification