Method and apparatus for token-based token termination
First Claim
Patent Images
1. An apparatus comprising:
- a memory operable to;
store a plurality of token-based rules, wherein a token-based rule facilitates access to a risk-sensitive resource; and
store a first token indicating that a user is accessing a non-risk- sensitive resource; and
a processor operable to;
receive a second token, the second token indicating that the user is attempting to access the risk-sensitive resource;
in response to receiving the second token, apply the token-based rule to make a first access decision whereby the user'"'"'s access to the non-risk-sensitive resource will be terminated;
in response to making the first access decision, generate at least one token representing the access decision;
communicate the at least one token representing the first access decision; and
receive a third token indicating that the user'"'"'s access to the non-risk sensitive resource is terminated;
in response to receiving the third token, generate at least one token representing a second access decision whether the user is granted access to the risk-sensitive resource; and
communicate the at least one token representing the second access decision.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, an apparatus may store a plurality of token-based rules that facilitate access to a risk-sensitive resource. The apparatus may further store a first token that may indicate that a user is accessing a non-risk-sensitive resource. The apparatus may receive a second token that may indicate that the user is attempting to access the risk-sensitive resource. In response to receiving the second token, the apparatus may apply the token-based rule to make an access decision whereby the user'"'"'s access to the non-risk-sensitive resource will be terminated. The apparatus may then communicate at least one token representing the access decision.
-
Citations
18 Claims
-
1. An apparatus comprising:
-
a memory operable to; store a plurality of token-based rules, wherein a token-based rule facilitates access to a risk-sensitive resource; and store a first token indicating that a user is accessing a non-risk- sensitive resource; and a processor operable to; receive a second token, the second token indicating that the user is attempting to access the risk-sensitive resource; in response to receiving the second token, apply the token-based rule to make a first access decision whereby the user'"'"'s access to the non-risk-sensitive resource will be terminated; in response to making the first access decision, generate at least one token representing the access decision; communicate the at least one token representing the first access decision; and receive a third token indicating that the user'"'"'s access to the non-risk sensitive resource is terminated; in response to receiving the third token, generate at least one token representing a second access decision whether the user is granted access to the risk-sensitive resource; and communicate the at least one token representing the second access decision. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for terminating access to a resource using token-based rules, comprising:
-
storing a plurality of token-based rules, wherein a token-based rule facilitates access to a risk-sensitive resource; storing a first token indicating that a user is accessing a non-risk-sensitive resource; receiving a second token, the second token indicating that the user is attempting to access the risk-sensitive resource; in response to receiving the second token, applying the token-based rule to make a first access decision whereby the user'"'"'s access to the non-risk-sensitive resource will be terminated; in response to making the first access decision, generating at least one token representing the first access decision; communicating the at least one token representing the first access decision; and receiving a third token indicating that the user'"'"'s access to the non-risk sensitive resource is terminated; in response to receiving the third token, generating at least one token representing a second access decision whether the user is granted access to the risk-sensitive resource; and communicating the at least one token representing the second access decision. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
store a plurality of token-based rules, wherein a token-based rule facilitates access to a risk-sensitive resource; store a first token indicating that a user is accessing a non-risk-sensitive resource; receive a second token, the second token indicating that the user is attempting to access the risk-sensitive resource; in response to receiving the second token, apply the token-based rule to make a first access decision whereby the user'"'"'s access to the non-risk-sensitive resource will be terminated; in response to making the first access decision, generate at least one token representing the access decision; communicate the at least one token representing the first access decision; receive a third token indicating that the user'"'"'s access to the non-risk sensitive resource is terminated; in response to receiving the third token, generate at least one token representing a second access decision whether the user is granted access to the risk-sensitive resource; and communicate the at least one token representing the second access decision. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification