Authentication enforcement at resource level
First Claim
Patent Images
1. A computer-implemented method comprising:
- providing authentication enforcement at resource level by;
specifying at design time at least one authentication key for at least one data storage unit of a resource;
receiving at a server a request from a requester through a client to access the resource; and
enforcing authentication of the requester through the at least one authentication key at the at least one data storage unit of the resource.
2 Assignments
0 Petitions
Accused Products
Abstract
The present description refers in particular to a computer-implemented method, a computer system, and a computer program product. The method may comprise providing authentication enforcement at resource level by specifying at design time at least one authentication key for at least one data storage unit of a resource. A request may be received at a server from a requester through a client to access the resource. Authentication of the requester may be enforced through the at least one authentication key at the at least one data storage unit of the resource.
16 Citations
20 Claims
-
1. A computer-implemented method comprising:
providing authentication enforcement at resource level by; specifying at design time at least one authentication key for at least one data storage unit of a resource; receiving at a server a request from a requester through a client to access the resource; and enforcing authentication of the requester through the at least one authentication key at the at least one data storage unit of the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 19)
-
10. A computer program product comprising computer readable instructions, which when loaded and run in a computer and/or computer network system, causes the computer system and/or the computer network system to perform operations including:
-
specifying at design time at least one authentication key for at least one data storage unit of a resource; receiving at a server a request from a requester through a client to access the resource; and enforcing authentication of the requester through the at least one authentication key at the at least one data storage unit of the resource.
-
-
11. Machine readable medium embodying instructions, which when executed by a machine, cause the machine to perform a method comprising:
-
specifying at design time at least one authentication key for at least one data storage unit of a resource; receiving at a server a request from a requester through a client to access the resource; and enforcing authentication of the requester through the at least one authentication key at the at least one data storage unit of the resource.
-
-
12. A computer system comprising:
-
an authentication mechanism for authentication enforcement at resource level, operable to; specify at design time at least one authentication key for at least one data storage unit of a resource; receive at a server a request from a requester through a client to access the resource; and enforce authentication of the requester through the at least one authentication key at the at least one data storage unit of the resource. - View Dependent Claims (13, 14, 15, 16, 17, 18, 20)
-
Specification