×

Security management framework

  • US 20110154455A1
  • Filed: 02/22/2005
  • Published: 06/23/2011
  • Est. Priority Date: 02/22/2005
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer-implemented method for providing access to a resource, the method comprising the steps of:

  • validating, with an adapter, a request for access to a resource received from a software program located on a client computer based at least on a username, a password, and an IP address included in the request which identifies the software program;

    identifying, with the adapter, an environment of the software program;

    identifying, with the adapter, a resource file located on a server, wherein the resource file includes encrypted credentials for accessing the resource, and wherein the adapter is remote from the server;

    retrieving encrypted credentials from the resource file based at least on the environment of the software program;

    decrypting, with the server, the encrypted credentials; and

    providing, with the adapter, decrypted credentials to the software program located on a client computer, wherein the software program is configured to use the decrypted credentials to access the resource.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×