Systems and methods for delegating information technology authorization to at least one other person
First Claim
Patent Images
1. A system for delegating authorization relating to an information technology resource, the system comprising:
- a processor;
memory in electronic communication with the processor;
a user database stored in the memory, wherein the user database includes a plurality of user identifications, wherein each user identification includes a trusted circle, and wherein the trusted circle comprises a plurality of trusted users, wherein each trusted user has a specific user authorization, wherein each trusted user in the trusted circle is individually selectable by an account owner and each specific user authorization is individually selectable by the account owner, whereby the account owner identified by a specific user identification selects the account owner'"'"'s own trusted circle and selects the specific authorizations for trusted users in the account owner'"'"'s own trusted circle, and wherein each account owner is only able to select the account owner'"'"'s trusted circles and not other account owner'"'"'s trusted circles; and
instructions stored in the memory, the instructions being executable to;
add a new trusted user to the trusted circle; and
provide a user interface for the new trusted user wherein the new trusted user is capable of resetting a password for the account owner or of reinstating an account for the account owner, wherein the new trusted user and the account owner are not the same user, and wherein adding the new trusted user to the trusted circle does not allow the new trusted user to access the account or the password for the account owner.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for delegating authorization relating to an information technology resource is described. The system includes a processor and memory in electronic communication with the processor. A user database is stored in the memory. The user database includes a plurality of user identifications and trusted circle data. Instructions are stored in the memory and are executable to add a new user to the trusted circle data and to provide a user interface for the new user so that the new user is capable of resetting a password for an account owner or of reinstating an account for the account owner.
44 Citations
8 Claims
-
1. A system for delegating authorization relating to an information technology resource, the system comprising:
-
a processor; memory in electronic communication with the processor; a user database stored in the memory, wherein the user database includes a plurality of user identifications, wherein each user identification includes a trusted circle, and wherein the trusted circle comprises a plurality of trusted users, wherein each trusted user has a specific user authorization, wherein each trusted user in the trusted circle is individually selectable by an account owner and each specific user authorization is individually selectable by the account owner, whereby the account owner identified by a specific user identification selects the account owner'"'"'s own trusted circle and selects the specific authorizations for trusted users in the account owner'"'"'s own trusted circle, and wherein each account owner is only able to select the account owner'"'"'s trusted circles and not other account owner'"'"'s trusted circles; and instructions stored in the memory, the instructions being executable to; add a new trusted user to the trusted circle; and provide a user interface for the new trusted user wherein the new trusted user is capable of resetting a password for the account owner or of reinstating an account for the account owner, wherein the new trusted user and the account owner are not the same user, and wherein adding the new trusted user to the trusted circle does not allow the new trusted user to access the account or the password for the account owner. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for delegating authorization relating to an information technology resource, the method comprising:
-
adding a plurality of user identifications to a user database being stored on a computing device, wherein each user identification includes a trusted circle, and wherein the trusted circle comprises a plurality of trusted users, wherein each trusted user has a specific user authorization, wherein each trusted user in the trusted circle is individually selectable by an account owner, whereby the account owner identified by a specific user identification selects the account owner'"'"'s own trusted circle and selects the specific authorizations for trusted users in the account owner'"'"'s own trusted circle, and wherein each account owner is only able to select the account owner'"'"'s trusted circles and not other account owner'"'"'s trusted circles; adding a new trusted user to the trusted circle; providing a user interface for the new trusted user wherein the new trusted user is capable of resetting a password for the account owner or of reinstating an account for the account owner, wherein the new trusted user and the account owner are not the same user, and wherein adding the new trusted user to the trusted circle does not allow the new trusted user to access the account or the password for the account owner; and resetting the password for the account owner by the new trusted user. - View Dependent Claims (7, 8)
-
Specification