DIFFERENTIATED AUTHENTICATION FOR COMPARTMENTALIZED COMPUTING RESOURCES
First Claim
1. A method, comprising:
- organizing one or more computing resources accessible in a desktop environment into a group, the one or more computing resources include a data content, an application, a network portal, and a device;
providing an authentication policy for each computing resource, each authentication policy corresponding an authentication input with each of a plurality of actions for the each computing resource;
receiving one authentication input when a user intends one of the plurality of actions on one of the computing resources; and
allowing the user to perform the intended one of the plurality of actions on the one of the computing resources when the one authentication input enables the intended one of the plurality of actions.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments for providing differentiated authentication for accessing groups of compartmentalized computing resources, and accessing each compartmentalized computing resources, as displayed on a desktop environment of an operating system. In one embodiment, a method includes organizing one or more computing resources accessible in a desktop environment into a group. The one or more computing resources include a data content, an application, a network portal, and a device. The method also includes providing an authentication policy for actions that can be performed on each computing resource. The authentication policy is configured to associate an authentication input to each action for a particular computing resource. The method further includes receiving an authentication input when the user intends one of the actions on the particular computing resource. The method additionally includes allowing the user to perform the intended action on the particular computing resource when the received authentication input enables the intended action.
58 Citations
20 Claims
-
1. A method, comprising:
-
organizing one or more computing resources accessible in a desktop environment into a group, the one or more computing resources include a data content, an application, a network portal, and a device; providing an authentication policy for each computing resource, each authentication policy corresponding an authentication input with each of a plurality of actions for the each computing resource; receiving one authentication input when a user intends one of the plurality of actions on one of the computing resources; and allowing the user to perform the intended one of the plurality of actions on the one of the computing resources when the one authentication input enables the intended one of the plurality of actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable medium storing computer-executable instructions that, when executed, cause one or more processors to perform acts comprising:
-
organizing one or more first computing resources accessible in a desktop environment into a first group, the one or more first computing resources include a data content, an application, a network portal, and a device; providing an authentication policy that associates a first authentication input with a first action on the first group and associating a second authentication input with a second action on the first group, the first authentication input being different from the second authentication input; receiving one authentication input when a user intends one of the first and second actions on the first group; and allowing the user to perform the intended action on the first group when the one authentication input is one of the first and second authentication inputs that is associated with the intended action. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method, comprising:
-
organizing one or more computing resources accessible in a desktop environment into a group, the one or more computing resources include a data content, an application, a network portal, and a device; providing an authentication policy for each computing resource, each authentication policy corresponding an authentication input with each of a plurality of actions for the each computing resource, each of the authentication inputs being different from other authentication in at least one of a type attribute and a strength attribute; receiving one authentication input when a user intends one of the plurality of actions on one of the computing resources; and allowing the user to perform the intended action on the one of the computing resources when the one authentication input enables the one of the plurality of actions being intended. - View Dependent Claims (19, 20)
-
Specification