×

Proxy server security token authorization

  • US 7,836,493 B2
  • Filed: 04/24/2003
  • Issued: 11/16/2010
  • Est. Priority Date: 04/24/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method of authorizing use of a particular computing resource by a user, comprising:

  • (a) a management server issuing, to a user computer, a secure authorization token, said secure authorization token having data including connection permission information that identifies the specific protected computer resource by at least one of name and port number;

    (b) examining, with a proxy server, the secure authorization token for authenticity, and extracting, with said proxy server, said connection permission information contained in the token to determine the user'"'"'s authorization to access said specific protected computing resource; and

    (c) if the secure authorization token is authentic, said proxy server using said secure authorization token data connection permission information to establish a proxy connection with said specific protected computing resource on behalf of the user and acting as an intermediary to pass information between the user computer and the specific protected computing resource, without said proxy server accessing or communicating with the management server to obtain user authorization information,wherein said management server is separate from said proxy server, said protected computing resource and said user computer.

View all claims
  • 25 Assignments
Timeline View
Assignment View
    ×
    ×