Method and system for providing access to computer resources that utilize distinct protocols for receiving security information and providing access based on received security information
First Claim
1. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
- receiving a request from the at least one user identifying one of the plurality of computer resources;
from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records, selecting one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and
using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for providing a user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information. A request is received from the user identifying one of the plurality of computer resources. From a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, one of the records of the set is selected whose identification of one of the plurality of computer resources best matches the request'"'"'s identification of one of the plurality of computer resources. The security information in the selected record is used to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
Citations
19 Claims
-
1. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user identifying one of the plurality of computer resources; from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records, selecting one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (2, 3, 4)
-
-
5. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user containing one or more values which identify one of the plurality of computer resources; from a set of previously stored records each of which contains one or more values that identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records, selecting one of the records of the set by comparing, for each record of the set, the one or more values from the record with the one or more values from the request to determine the number of matching values and choosing the record having the highest number of matching values; and using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
-
6. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user containing one or more values which identify one of the plurality of computer resources; from a set of previously stored records each of which contains one or more values that identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records, selecting one of the records of the set by comparing, for each record of the set, the one or more values from the record with the one or more values from the request to determine the number of consecutive matching values and selecting the record having the highest number of consecutive matching values; and using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
-
7. A system for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the system comprising:
-
a computer system comprised of; a security interface in communication with the at least one user, and a resource interface in communication with each of the plurality of computer resources and capable of operating according the distinct protocol utilized by each computer resource; and a database storing a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records; wherein upon receiving a request from the at least one user identifying one of the plurality of computer resources, the security interface selects one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources and causes the resource interface to use the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (8, 9, 10)
-
-
11. A system for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the system comprising:
-
means for receiving a request from the at least one user identifying one of the plurality of computer resources; means for selecting, from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records, one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and means for using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (12, 13)
-
-
14. A computer usable medium having computer readable code embodied therein, the computer readable code, when executed, causing a computer to implement a method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user identifying one of the plurality of computer resources; selecting, from a set of previously stored records each of which identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, wherein at least two records identify the same computer resource to allow different levels of access to the same computer resource by the at least one user for each of the records, one of the records of the set whose identification of one of the plurality of computer resources is related to the request'"'"'s identification of one of the plurality of computer resources; and using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource. - View Dependent Claims (15, 16, 17)
-
-
18. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user containing one or more values which identify one of the plurality of computer resources; from a set of previously stored records each of which contains one or more values that identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, selecting one of the records of the set by comparing, for each record of the set, the one or more values from the record with the one or more values from the request to determine the number of matching values and choosing the record having the highest number of matching values; and using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
-
19. A method for providing at least one user with access to a plurality of computer resources, at least some of which utilize distinct protocols for receiving security information and for providing access to outside systems based on received security information, the method comprising:
-
receiving a request from the at least one user containing one or more values which identify one of the plurality of computer resources; from a set of previously stored records each of which contains one or more values that identifies one of the plurality of computer resources and contains security information for allowing access to the computer resource identified in the record, the computer resource using a distinct protocol from the rest of the plurality of computer resources to receive security information, selecting one of the records of the set by comparing, for each record of the set, the one or more values from the record with the one or more values from the request to determine the number of consecutive matching values and selecting the record having the highest number of consecutive matching values; and using the security information in the selected record to provide access to the computer resource identified in the request according to the distinct protocol utilized by that resource.
-
Specification