×

TECHNIQUES FOR DELEGATION OF ACCESS PRIVILEGES

  • US 20140310769A1
  • Filed: 06/26/2014
  • Published: 10/16/2014
  • Est. Priority Date: 05/31/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,receiving information indicating one or more permissions specified by a delegator;

    generating credential information encoding the one or more permissions consistent with a policy set maintained independently from the generated credential information, the policy set being modifiable after generating the credential information to revoke access specified by the delegator by at least modifying the policy such that set the one or more permissions specified by the delegator conflicts with the policy set or modifying the policy set that the delegator'"'"'s ability to delegate has been revoked;

    receiving, from a delegatee, a request to access a resource, the request including the generated credential information;

    determining, based at least in part on the permissions encoded by the received generated credential information and at least in part on the policy set, whether to provide to the delegatee access to the resource; and

    providing to the delegatee access to the resources based at least in part on the determination that the policy set still allows the delegator to delegate access.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×