ACCESS CONTROL USING IDENTIFIERS IN LINKS
First Claim
Patent Images
1. A method comprising:
- receiving a resource access identifier, the resource access identifier associated with a shared computing resource;
embedding the resource access identifier into a link to the shared computing resource;
inserting the link into an information element;
associating an access control scheme with the information element to generate a protected information element; and
sending the protected information element to a destination computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media are disclosed for access control. A particular method receives a resource access identifier associated with a shared computing resource and embeds the resource access identifier into a link to the shared resource. The link to the shared resource is inserted into an information element. An access control scheme is associated with the information element to generate a protected information element, and the protected information element is sent to a destination computing device.
106 Citations
20 Claims
-
1. A method comprising:
-
receiving a resource access identifier, the resource access identifier associated with a shared computing resource; embedding the resource access identifier into a link to the shared computing resource; inserting the link into an information element; associating an access control scheme with the information element to generate a protected information element; and sending the protected information element to a destination computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a first computing device configured to; send a request for a resource access identifier that allows access to a shared resource; receive the resource access identifier; embed the resource access identifier into a link; insert the link into an information element; associate an access control scheme with the information element; and a network interface to send the information element to a second computing device that is capable of verifying that the access control scheme associated with the information element allows access to the information element. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable medium comprising instructions, that when executed by a processor of an access gateway, cause the processor to:
-
receive, at the access gateway, a request from a first device for a cryptographic token that allows access, via the access gateway, to a shared resource located at a file server; send the cryptographic token from the access gateway to the first device; receive, at the access gateway, an attempt from a second device to access the shared resource using the cryptographic token; and facilitate access to the shared resource by the second device via the access gateway. - View Dependent Claims (17, 18, 19, 20)
-
Specification