Controlling Access to Resources on a Network
First Claim
Patent Images
1. A method comprising:
- receiving a request to access a remote resource, wherein the request comprises a device identifier and at least one user credential;
determining whether to authenticate the request according to at least one compliance policy; and
in response to determining to authenticate the request according to the at least one compliance policy, providing a resource credential associated with the remote resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for controlling access to data on a network. Upon receiving a request comprising a device identifier and at least one user credential to access a remote resource, the request may be authenticated according to at least one compliance policy. If the request is authenticated, a resource credential associated with the remote resource may be provided.
54 Citations
20 Claims
-
1. A method comprising:
-
receiving a request to access a remote resource, wherein the request comprises a device identifier and at least one user credential; determining whether to authenticate the request according to at least one compliance policy; and in response to determining to authenticate the request according to the at least one compliance policy, providing a resource credential associated with the remote resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
a memory storage; and a processing unit coupled to the memory storage, wherein the processing unit is operative to; intercept a request to access a resource, determine whether the resource comprises a remote resource, in response to determining that the resource comprises the remote resource, determine whether to authorize the request to access the remote resource, and in response to determining to authorize the request to authorize the remote resource, insert at least one resource credential into the request to access the resource. - View Dependent Claims (13, 14, 15)
-
-
16. A computer-readable medium which stores a set of instructions that when executed performs a method executed by the set of instructions comprising:
-
generating a request to access a remote resource; providing the request to a compliance service; determining whether the compliance service approved the request; and in response to determining that the compliance service approved the request; providing the request to a proxy service, receiving a modified request from the proxy service, and transmitting the request to access the remote resource to a resource service associate with the remote resource. - View Dependent Claims (17, 18, 19, 20)
-
Specification