Secured distributed impersonation
First Claim
1. A computer-implemented method comprising:
- assigning a job by a dispatch to an originating account, the originating account not having adequate resources to accomplish the job;
sending a request for network account credentials from the originating account to the dispatch that is associated with a published object, the network account credentials include the resources to complete the job, the request directed to the published object includes an identification of an unpublished object associated with the originating account, the published object is accessible by an account without prior identification of the published object and the unpublished object is accessible by the account when the account is previously informed about the identification of the unpublished object;
authenticating the originating account at the dispatch;
determining the network account credentials to send to the originating account, the network account credentials facilitate the originating account to impersonate a network account of the dispatch to complete the job in a secured manner; and
upon authenticating the originating account, sending an emblem that includes the published object and the network account credentials from the dispatch to the originating account.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to secured distributed impersonation, for use within systems such as batch system and batch message transaction systems. In one embodiment, a method includes sending a request for credentials of a network account from an originating account associated with an unpublished object to a dispatch associated with a published object. In one embodiment, both the unpublished and the published objects can each be a message queue. The dispatch authenticates the originating account. Upon successful authentication, the network account access emblem is sent to the originating account—that is, the originating account receives the requested credentials, which facilitate the ability to impersonate into the network account.
36 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
assigning a job by a dispatch to an originating account, the originating account not having adequate resources to accomplish the job; sending a request for network account credentials from the originating account to the dispatch that is associated with a published object, the network account credentials include the resources to complete the job, the request directed to the published object includes an identification of an unpublished object associated with the originating account, the published object is accessible by an account without prior identification of the published object and the unpublished object is accessible by the account when the account is previously informed about the identification of the unpublished object; authenticating the originating account at the dispatch; determining the network account credentials to send to the originating account, the network account credentials facilitate the originating account to impersonate a network account of the dispatch to complete the job in a secured manner; and upon authenticating the originating account, sending an emblem that includes the published object and the network account credentials from the dispatch to the originating account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-readable storage media having computer-readable instructions thereon which, when executed by a computer, implement a method comprising:
-
assigning a job by a dispatch to an originating account, the originating account not having adequate resources to accomplish the job; sending a request for network account credentials from the originating account to the dispatch that is associated with a published object, the network account credentials include the resources to complete the job, the request directed to the published object includes an identification of an unpublished object associated with the originating account; authenticating the originating account at the dispatch; determining the network account credentials to send to the originating account; and upon authenticating the originating account, sending an emblem that includes the published object and the network account credentials from the dispatch to the originating account. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computing device comprising:
-
a memory; a processor, coupled to the memory, configured to implement a method comprising; assigning a job by a dispatch to an originating account, the originating account not having adequate resources to accomplish the job; sending a request for network account credentials from the originating account to the dispatch that is associated with a published object, the network account credentials include the resources to complete the job, the request directed to the published object includes an identification of an unpublished object associated with the originating account; authenticating the originating account at the dispatch; determining the network account credentials to send to the originating account; and upon authenticating the originating account, sending an emblem that includes the published object and the network account credentials from the dispatch to the originating account. - View Dependent Claims (18, 19, 20)
-
Specification