Split password vault
First Claim
Patent Images
1. A method, comprising:
- receiving, from a user device, a request to access a cloud service;
determining an identity of a user making the request to access the cloud service;
comparing, by a processor, the identity of the user to a password vault control policy; and
determining, based on the comparing, one or more sections of a split password vault to which the user has access, the split password vault comprising a first section storing a first set of log-in credentials and a second section storing a second set of log-in credentials, wherein the user has control over management of the first section of the split password vault and an organization associated with the user has control over management of the second section of the split password vault.
2 Assignments
0 Petitions
Accused Products
Abstract
A cloud service access and information gateway receives, from a user device, a request to access a cloud service. The cloud service access and information gateway determines an identity of a user making the request to access the cloud service and compares the identity of the user to a password vault control policy. The cloud service access and information gateway determines, based on the comparing, one or more sections of a split password vault to which the user has access. The split password vault comprises a first section storing a first set of log-in credentials and a second section storing a second set of log-in credentials.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, from a user device, a request to access a cloud service; determining an identity of a user making the request to access the cloud service; comparing, by a processor, the identity of the user to a password vault control policy; and determining, based on the comparing, one or more sections of a split password vault to which the user has access, the split password vault comprising a first section storing a first set of log-in credentials and a second section storing a second set of log-in credentials, wherein the user has control over management of the first section of the split password vault and an organization associated with the user has control over management of the second section of the split password vault. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a processor; and a memory coupled with the processor, the memory storing; a split password vault storing log-in credentials for a plurality of cloud services, the split password vault comprising a first section storing a first set of log-in credentials and a second section storing a second set of log-in credentials, wherein the user has control over management of the first section of the split password vault and an organization associated with the user has control over management of the second section of the split password vault. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium including instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving, from a user device, a request to access a cloud service; determining an identity of a user making the request to access the cloud service; comparing, by the processor, the identity of the user to a password vault control policy; and determining, based on the comparing, one or more sections of a split password vault to which the user has access, the split password vault comprising a first section storing a first set of log-in credentials and a second section storing a second set of log-in credentials, wherein the user has control over management of the first section of the split password vault and an organization associated with the user has control over management of the second section of the split password vault. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification