System for securing inbound and outbound data packet flow in a computer network
DCFirst Claim
Patent Images
1. A method for providing access to a network resource, comprising:
- receiving, at a network node that is pre-authorized to access the network resource, a request to allow a first user to assume an identity of the network node, the network node that is pre-authorized having a plurality of access privileges associated therewith;
allowing the first user to assume the identity of the network node that is pre-authorized, such that the first user appears to the network resource to be the network node that is pre-authorized, after verifying that the first user is authorized; and
based on the first user assuming the identity of the network node that is pre-authorized, allowing the first user to access the network resource using the plurality of access privileges associated with the network node that is pre-authorized.
5 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method provides for control of access to network resources. A virtual identity machine resides in the network and is pre-authorized to access certain network resources. End users desiring access to those network resources attempt to logically connect to the virtual identity machines. If the logical connection attempt is successful, then the end user assumes the virtual identity of the virtual identity machine and has access to all of the same information that was available to the virtual identity machine.
-
Citations
18 Claims
-
1. A method for providing access to a network resource, comprising:
-
receiving, at a network node that is pre-authorized to access the network resource, a request to allow a first user to assume an identity of the network node, the network node that is pre-authorized having a plurality of access privileges associated therewith; allowing the first user to assume the identity of the network node that is pre-authorized, such that the first user appears to the network resource to be the network node that is pre-authorized, after verifying that the first user is authorized; and based on the first user assuming the identity of the network node that is pre-authorized, allowing the first user to access the network resource using the plurality of access privileges associated with the network node that is pre-authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product configured to provide access to a network resource, comprising a non-transitory computer readable medium having computer readable program code embodied therein, the computer readable program product comprising:
-
computer readable program code configured to receive a request to allow a first user to assume an identity of a network node that is pre-authorized to access the network resource, the network node that is pre-authorized having a plurality of access privileges associated therewith; computer readable program code configured to verify that the first user is authorized, and to allow the first user to assume the identity of the network node that is pre-authorized, such that the first user appears to the network resource to be the network node that is pre-authorized, after verifying that the first user is authorized; and computer readable program code configured to allow the first user to access the network resource using the plurality of access privileges associated with the network node that is pre-authorized, based on the first user assuming the identity of the network node that is pre-authorized. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer system comprising:
-
a network resource; and a network node that is pre-authorized to access the network resource and having a plurality of access privileges associated therewith; wherein the network node is configured to receive a request to allow a first user to assume an identity of the network node, to verify that the first user is authorized, and to allow the first user to assume the identity of the network node, such that the first user appears to the network resource to be the network node that is pre-authorized, and wherein the network resource is configured to allow the first user to access the network resource using the plurality of access privileges associated with the network node that is pre-authorized, based on the first user assuming the identity of the network node. - View Dependent Claims (15, 16, 17, 18)
-
Specification