Method and system for providing access to computer resources
First Claim
1. A method for providing access to computer resources on a computer system, comprising:
- under control of a client system,providing user information to a server system, the user information including authentication, authorization, and credit information for a user of the client system;
receiving from the server system, a token including encrypted information generated from the user information provided by the client system;
a remote application manager component; and
at least one computer resource, each computer resource being encrypted and the particular computer resources received being determined from the authorization information contained in the provided user information;
under control of the remote application manager component on the client system,decrypting at the client system the token in response to a request to initiate execution of one of the computer resources;
authenticating the user of the client computer system;
verifying whether the user is authorized to use the requested computer resource;
verifying whether the user has sufficient credit contained in the token to use the requested computer resource;
when the user is authenticated, authorized, and has sufficient credit, decrypting and initiating execution of the requested computer resource; and
monitoring the usage of the executing computer resource and providing a notification when the monitored usage has exceeded the user'"'"'s credit.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and computer system for providing access to computer resources on a computer system and includes generating a token containing encrypted user information including credit, authorization, and authentication information. A request is initiated to open an encrypted computer resource stored on the computer system, and execution of a remote application manager component on the computer system is also initiated. The remote application manager component decrypts the token and authenticates a user using authentication information stored in the token. Whether the user is authorized and has sufficient credit are then verified. When the user is approved, the requested computer resource is decrypted and opened. Use of the computer resource is monitored to determine whether the user has sufficient credit to continue using the computer resource. A notification is provided when the monitored usage of the opened computer resource has exceeded the credit.
-
Citations
16 Claims
-
1. A method for providing access to computer resources on a computer system, comprising:
-
under control of a client system, providing user information to a server system, the user information including authentication, authorization, and credit information for a user of the client system; receiving from the server system, a token including encrypted information generated from the user information provided by the client system; a remote application manager component; and at least one computer resource, each computer resource being encrypted and the particular computer resources received being determined from the authorization information contained in the provided user information; under control of the remote application manager component on the client system, decrypting at the client system the token in response to a request to initiate execution of one of the computer resources; authenticating the user of the client computer system; verifying whether the user is authorized to use the requested computer resource; verifying whether the user has sufficient credit contained in the token to use the requested computer resource; when the user is authenticated, authorized, and has sufficient credit, decrypting and initiating execution of the requested computer resource; and monitoring the usage of the executing computer resource and providing a notification when the monitored usage has exceeded the user'"'"'s credit. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for providing access to computer resources on a computer system including client and server systems, comprising:
-
under control of a client system, providing user information to a server system, the user information including authentication, authorization, and credit information for a user of the client system; under control of a server system, generating a token including encrypted information generated from the user information provided by the client system; sending the token to the client system; sending a remote application manager component to the client system; sending at least one computer resource to the client system, each computer resource that is sent being encrypted; under control of the remote application manager component on the client system, initiating execution of the remote application manager component in response to a request to initiate execution of the computer resource; decrypting at the client system the token and authenticating a user of the client computer system; verifying at the client system whether the user is authorized to use the computer resource; verifying at the client system whether the user has sufficient credit contained in the token to use the computer resource; when the user is authenticated, authorized, and has sufficient credit, decrypting and initiating execution of the computer resource; and monitoring the usage of the executing computer resource at the client system and providing notification when the monitored usage has exceeded the user'"'"'s credit. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification