System and method for providing distributed access control to secured documents
First Claim
1. A method for providing access to a secured document, the method comprising:
- requesting authentication of a user having credential information to a first server at a first location having a first instance of the secured document stored therein;
in response to determining that the user is authenticated to the first server, requesting that a connection be established that allows the user to access the first instance of the secured document at the first server; and
upon receiving a request from the user to access a second instance of the secured document at a second server at a second location;
requesting authentication of the user to the second server;
determining whether access to the secured document is permitted from the second location via the second server;
in response to determining that the user is authenticated to the second server and that access to the secured document is permitted from the second location, requesting disconnection of the user from the first server; and
requesting that a connection be established that allows the user to access the second instance of the secured document at the second server.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for providing distributed access control are disclosed. A number of local servers are employed to operate largely on behalf of a central server responsible for centralized access control management. Such a distributed fashion ensures the dependability, reliability and scalability of the access control management undertaking by the central server. According to one embodiment, a distributed access control system that restricts access to secured items can include at least a central server having a server module that provides overall access control, and a plurality of local servers. Each of the local servers can include a local module that provides local access control. The access control, performed by the central server or the local servers, operates to permit or deny access requests to the secured items by requestors.
-
Citations
24 Claims
-
1. A method for providing access to a secured document, the method comprising:
-
requesting authentication of a user having credential information to a first server at a first location having a first instance of the secured document stored therein; in response to determining that the user is authenticated to the first server, requesting that a connection be established that allows the user to access the first instance of the secured document at the first server; and upon receiving a request from the user to access a second instance of the secured document at a second server at a second location; requesting authentication of the user to the second server; determining whether access to the secured document is permitted from the second location via the second server; in response to determining that the user is authenticated to the second server and that access to the secured document is permitted from the second location, requesting disconnection of the user from the first server; and requesting that a connection be established that allows the user to access the second instance of the secured document at the second server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An article of manufacture including a computer-readable medium having instructions stored thereon, that, in response to execution by a computing device, cause the computing device to perform operations comprising:
-
requesting authentication of a user having credential information at a first server having a first instance of a secured document stored therein; in response to determining that the user is authenticated to the first server, requesting that a connection be established that allows the user to access the first instance of the secured document at the first server; and upon receiving a request from the user to access a second instance of the secured document at a second server from a second location; requesting authentication of the user to the second server; determining whether access to the second instance of the secured document is permitted from the second location via the second server; in response to determining that the user is authenticated to the second server and that access to the secured document is permitted from the second location, requesting disconnection of the user from the first server; and requesting that a connection be established that allows the user to access the second instance of the secured document at the second server. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for controlling access to a secured document, comprising:
an access control device configured to; request authentication of a user having credential information by a first server having a first instance of the secured document stored therein; in response to determining that the user is authenticated by the first server, request that a connection be established that allows the user to access the first instance of the secured document at the first server; and upon receiving a request from the user for access to a second instance of the secured document stored at a second server; request authentication of the user by the second server; determine whether the second server permits access to the second instance of the secured document; in response to determining that the user is authenticated to the second server and that the second server permits access to the second instance of the secured document, request that the user be disconnected from the first server; and request that a connection be established that allows the user to access the secured document at the second server. - View Dependent Claims (20, 21, 22, 23, 24)
Specification