CLOUD COMPUTING EXCHANGE FOR IDENTITY PROOFING AND VALIDATION
First Claim
Patent Images
1. A method of allowing network access comprising:
- requesting, by a processor, a first set of credentials, wherein the first set of credentials allows a user access to a first application;
receiving, in a processor, the first set of credentials;
associating, by a processor, the first set of credentials with a second set of credentials, wherein the second set of credentials allows the user access to a second application, and wherein the second set of credentials are associated with a network identity;
validating the network identity of the user based on the first and second set of credentials;
allowing access to the second application according to the validated network identity according to the first set of credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
An architecture and method to provide a cloud based credential exchange wherein organizations and users can use the services of a centralized and streamlined credential clearing house. A user can provide credentials or verification from a third party credential provider to the credential exchange. The credential exchange can use the third party credentials to provide access to multiple networks affiliated with the credential exchange.
-
Citations
3 Claims
-
1. A method of allowing network access comprising:
-
requesting, by a processor, a first set of credentials, wherein the first set of credentials allows a user access to a first application; receiving, in a processor, the first set of credentials; associating, by a processor, the first set of credentials with a second set of credentials, wherein the second set of credentials allows the user access to a second application, and wherein the second set of credentials are associated with a network identity; validating the network identity of the user based on the first and second set of credentials; allowing access to the second application according to the validated network identity according to the first set of credentials. - View Dependent Claims (2, 3)
-
Specification