System and method for automating a request for access to a restricted computer accessible resource
First Claim
Patent Images
1. A method of automating a request for access to a restricted computer accessible resource, comprising:
- attempting access by a user to a desired resource at a resource server;
receiving the access attempt at a resource provider through the resource server, the resource provider comprising an administrator of the desired resource, wherein the access attempt at the resource provider is received only when the administrator has not set a program module to prevent requests for access to the resource;
if the desired access is not authorized, notifying, from the resource server, the user that access is denied;
providing, from the resource server, the user a request for access application for returning to the resource provider, the request being free of information identifying the administrator;
allowing the user to send the request, through the resource server, for access application to the resource provider in response to notifying the user that access is denied without providing the user the identity of the administrator of the desired resource and without providing the user the address of the administrator of the desired resource;
sending, from the resource server, the request for access application to the resource provider;
at the resource provider, reviewing the request for access application and determining whether access to the desired resource is granted; and
if access to the desired resource is granted at the resource provider, granting the user access to the desired resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for automating a request for access to computer accessible resources. If access to a computer accessible resource is denied, an automated request for access may be forwarded to a provider of the resource without the need for the requestor to know the identity and/or address of the provider. If the provider grants access to the requestor, access may be automatically granted, or access may be granted along with a notification to the requestor of the granted access.
-
Citations
34 Claims
-
1. A method of automating a request for access to a restricted computer accessible resource, comprising:
-
attempting access by a user to a desired resource at a resource server; receiving the access attempt at a resource provider through the resource server, the resource provider comprising an administrator of the desired resource, wherein the access attempt at the resource provider is received only when the administrator has not set a program module to prevent requests for access to the resource; if the desired access is not authorized, notifying, from the resource server, the user that access is denied; providing, from the resource server, the user a request for access application for returning to the resource provider, the request being free of information identifying the administrator; allowing the user to send the request, through the resource server, for access application to the resource provider in response to notifying the user that access is denied without providing the user the identity of the administrator of the desired resource and without providing the user the address of the administrator of the desired resource; sending, from the resource server, the request for access application to the resource provider; at the resource provider, reviewing the request for access application and determining whether access to the desired resource is granted; and if access to the desired resource is granted at the resource provider, granting the user access to the desired resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of automating a request for access to a restricted computer accessible resource, comprising:
-
sending an access attempt from a client computer to a resources server for obtaining access a desired resource maintained on the resources server; receiving the access attempt at the resources server, wherein the access attempt at the resources server is received only when the administrator has not set a program module to prevent requests for access to the resources server; at the resources server, parsing a list of authorized users of the desired resource to determine whether a user sending the access attempt is authorized to access the desired resource; if the desired access is not authorized, sending the user an access denied notification at the client computer; providing the user a request for access application for returning to the resources server; allowing the user to send the request for access application from the client computer to the resources server without providing the user the identity or address of a provider of the desired resource; sending the request for access application to the resources server; at the resources server, reviewing the request for access application and determining whether access to the desired resource is granted wherein determining whether access to the desired resource is granted comprises verifying with a network service provider of the user that the user is associated with a trusted source; and if access to the desired resource is granted, granting the user access to the desire resource. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A system of automating a request for access to a restricted computer accessible resource, comprising:
-
a client computer operative to send an access attempt to a resources server for obtaining access a desired resource maintained on the resources server; a program module at the resources server operative to; receive the access attempt at the resources server, wherein the access attempt at the resources server is received only when the administrator has not set a program module to prevent requests for access to the resources server; parse a list of authorized users of the desired resource to determine whether a user sending the access attempt is authorized to access the desired resource; send the user an access denied notification at the client computer if the desired access is not authorized; provide the user a request for access application for returning to the resources server, the request for access application including a first field for receiving a reason for which the user desires access to the desired resource and a second field for indentifying at least one of the following associated with the desired resource;
a web page, a document, a spreadsheet, and a database; andallow the user to send the request of access application from the client computer to the resources server without proving the user the identity or address of a provider of the desired source; the client computer further operative to send the request for access application to the resources server; and the program module at the resources server further operative to; pass the request for access application to a provider of the desired resource for a determination of whether access to the desired resource is granted; and allow the user access to the desired resource if access to the desired resource is granted. - View Dependent Claims (28, 29, 30)
-
-
31. A computer readable medium containing instructions which when executed by a computer perform the steps of:
-
receiving an access attempt from a client computer sent to a resources server for obtaining access a desired resource maintained on the resources server, wherein the access attempt from the client computer is received only when an administrator has not set a program module to prevent requests for access to the resources server; parsing a list of authorized users of the desired resource to determine whether a user sending the access attempt is authorized to access the desired resource; sending the user an access denied notification at the client computer if the desired access is not authorized; proving the user a request for access application for returning to the resources server; allowing the user to send the request for access application from the client computer to the resources server without providing the user the identity or address of a provider of the desired resource; receiving the request for access application to the resources server; forwarding the request for access application to a provider of the desired resource for a determination of whether access to the desired resource is granted wherein the determination comprises determining whether access to the desired resource is granted comprises verifying with a network service provider of the user that an electronic mail address of the user is associated with a trusted source; and allowing the user access to the desired resource if access to the desired resource is granted. - View Dependent Claims (32)
-
-
33. A system of automating a request for access to a restricted computer accessible resource, comprising an access request program module resident on a resources server containing computer implementable instructions which when implemented by a computer of the resources server is operative to:
-
parse a list of authorized users to determine whether a user is authorized for access to resources of the resources server; forward an access denied notification and an access request page to the user; receive a request of access application from the user after authentication of the user as being from a trusted source from which the resources server will accept communication, the request of access application including a first field for receiving a reason for which the user desires access to the resource and a second field for identifying at least one of the following associated with the resource;
a web page, a document, a spreadsheet, and a database, wherein the access application from the user is received only when the administrator has not set the program module to prevent requests for access to the resources server;forward information contained in the request for access application to an administrator of the resources of the resources server; provide the administrator a user access page for allowing the administrator to allow or deny access to the resources by the user; and accept input from the administrator. - View Dependent Claims (34)
-
Specification