SECURING COMPUTING RESOURCES
First Claim
1. A method for providing access to computing resources, comprising:
- receiving, by a resource system, an access request from a first user, wherein the access request comprises resource data describing a computing resource, and function data describing a requested function to be performed on the computing resource, wherein the resource system comprises at least one processor and memory in communication with the at least one processor;
determining, by the resource system, that credential data provided by the first user is valid;
identifying, by the resource system, secondary data for the access request;
generating, by the resource system, an access object based at least in part on access object fragment data and the secondary data; and
executing the access object, by the resource system, to enable performance of the requested function on the computing resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Various examples are directed to systems and methods for providing access to computing resources. A resource system may receive an access request from a first user. The access request may comprise resource data describing a computing resource and function data describing a requested function to be performed on the computing resource. The resource system may determine that credential data provided by the first user is valid. The resource system may identify secondary data for the access request and generate an access object based at least in part on access object fragment data and the secondary data. The resource system may execute the access object to enable performance of the requested function on the computing resource.
-
Citations
21 Claims
-
1. A method for providing access to computing resources, comprising:
-
receiving, by a resource system, an access request from a first user, wherein the access request comprises resource data describing a computing resource, and function data describing a requested function to be performed on the computing resource, wherein the resource system comprises at least one processor and memory in communication with the at least one processor; determining, by the resource system, that credential data provided by the first user is valid; identifying, by the resource system, secondary data for the access request; generating, by the resource system, an access object based at least in part on access object fragment data and the secondary data; and executing the access object, by the resource system, to enable performance of the requested function on the computing resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system for securing computing resources comprising:
a computing device comprising at least one processor and a memory in communication with the at least one processor, wherein the computing device is programmed to; receive an access request from a first user, wherein the access request comprises resource data describing a computing resource, function data describing a requested function to be performed on the computing resource; determine that credential data provided by the first user is valid; determine secondary data for the access request; generate an access object based at least in part on access object fragment data and the secondary data; and execute the access object to enable performance of the requested function on the computing resource. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
Specification