System and Method of Controlling Access to Information in a Virtual Computing Environment
First Claim
1. A computer-implemented method of controlling access to information in a virtual computing environment comprising:
- storing authorization data on a first client computer system;
accessing virtual computing software from the first client computer system;
accessing a virtual object in the virtual computing software in response to instructions received from the first client computer system;
sending the authorization data from the first client computer system to a second computer system, wherein the authorization data specifies access rights on the second computer system; and
accessing the second computer system using the authorization data and determining access rights on the second computer system based on said authorization data.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment the present invention includes a computer-implemented method comprising storing authorization data on a first client computer system, accessing virtual computing software from the first client computer system, accessing a virtual object in the virtual computing software in response to instructions received from the first client computer system, sending the authorization data from the first client computer system to a second computer system, wherein the authorization data specifies access rights on the second computer system, and accessing the second computer system using the authorization data and determining access rights on the second computer system based on said authorization data.
63 Citations
20 Claims
-
1. A computer-implemented method of controlling access to information in a virtual computing environment comprising:
-
storing authorization data on a first client computer system; accessing virtual computing software from the first client computer system; accessing a virtual object in the virtual computing software in response to instructions received from the first client computer system; sending the authorization data from the first client computer system to a second computer system, wherein the authorization data specifies access rights on the second computer system; and accessing the second computer system using the authorization data and determining access rights on the second computer system based on said authorization data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium containing instructions for controlling a computer system to perform a method, the method comprising:
-
storing authorization data on a first client computer system; accessing virtual computing software from the first client computer system; accessing a virtual object in the virtual computing software in response to instructions received from the first client computer system; sending the authorization data from the first client computer system to a second computer system, wherein the authorization data specifies access rights on the second computer system; and accessing the second computer system using the authorization data and determining access rights on the second computer system based on said authorization data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification