Ad hoc access rights in restricted-access electronic space
First Claim
Patent Images
1. A system comprising:
- a database of authorized users; and
a server configured to host said system, the server configured to;
receive a request for a requester to access an electronic meeting hosted by the server;
based on determining that the request provides information sufficient for the server to automatically associate the requester with an authorized user in the database of authorized users, grant access to the requester;
based on determining that the request does not provide information sufficient for the server to automatically associate the requester with an authorized user in the database of authorized users, provide a graphical user interface in real time during the electronic meeting comprising a request interface, wherein said request interface provides user identification information from the request and receives input to grant or deny access to said requester.
3 Assignments
0 Petitions
Accused Products
Abstract
One embodiment of the present invention provides the administrator of an access restricted electronic system with a flexible management scheme. In this scheme, users request access to the electronic system. Users who submit verified access information, such as a login identification and password, are immediately granted access as authorized users. Users who have not submitted access information, are presented to the administrator through an interface that enables the administrator to grant ad hoc access.
-
Citations
17 Claims
-
1. A system comprising:
-
a database of authorized users; and a server configured to host said system, the server configured to; receive a request for a requester to access an electronic meeting hosted by the server; based on determining that the request provides information sufficient for the server to automatically associate the requester with an authorized user in the database of authorized users, grant access to the requester; based on determining that the request does not provide information sufficient for the server to automatically associate the requester with an authorized user in the database of authorized users, provide a graphical user interface in real time during the electronic meeting comprising a request interface, wherein said request interface provides user identification information from the request and receives input to grant or deny access to said requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 14, 15, 16, 17)
-
-
8. A method comprising:
-
receiving, by at least one computing device comprised in an access-restricted system, a request for a requester to access an electronic meeting hosted by the access-restricted electronic system; based on determining that the request provides access information sufficient for the at least one computing device to automatically verify the access information, granting, by the at least one computing device, access to the requester; based on determining that the request does not provide access information sufficient for the at least one computing device to automatically verify the access information, providing, by the at least one computing device, a graphical user interface in real time during the electronic meeting comprising a request interface, wherein said request interface provides user identification information from the request and receives input to grant or deny access to said requester. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification