Access to a computing environment by computing devices
First Claim
Patent Images
1. A method for managing access of a computing device to a plurality of assets of a computing environment, the method comprising:
- providing at least one credential at the computing device, the at least one credential identifying both the computing device and a user of the computing device;
storing data at the computing environment relating to the computing device and the user in association with the at least one credential, the data indicating which of the assets the computing device is permitted to access when the at least one credential is authenticated;
the computing device communicating the at least one credential to the computing environment;
the computing environment selectively granting an access request received from the computing device in accordance with the data stored at the computing environment in association with the at least one credential and in accordance with a status the computing environment determined for the at least one credential communicated by the computing device;
flagging the data at the computing environment and associated with the at least one credential as being inactive in response to a reported loss, theft, or decommissioning of the computing device identified by the at least one credential; and
the computing environment denying the access request in the event that the computing environment determines that the computing device identified with the at least one credential associated is inactive.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for managing access to a computing environment by a computing device includes providing at least one credential that identifies both the computing device and a user of the computing device, storing data at the computing environment relating to the computing device and the user in association with the credential, and selectively granting an access request received from the computing device using the credential in accordance with the data stored at the computing environment.
-
Citations
12 Claims
-
1. A method for managing access of a computing device to a plurality of assets of a computing environment, the method comprising:
-
providing at least one credential at the computing device, the at least one credential identifying both the computing device and a user of the computing device; storing data at the computing environment relating to the computing device and the user in association with the at least one credential, the data indicating which of the assets the computing device is permitted to access when the at least one credential is authenticated; the computing device communicating the at least one credential to the computing environment; the computing environment selectively granting an access request received from the computing device in accordance with the data stored at the computing environment in association with the at least one credential and in accordance with a status the computing environment determined for the at least one credential communicated by the computing device; flagging the data at the computing environment and associated with the at least one credential as being inactive in response to a reported loss, theft, or decommissioning of the computing device identified by the at least one credential; and the computing environment denying the access request in the event that the computing environment determines that the computing device identified with the at least one credential associated is inactive. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for managing access of a computing device to a plurality of assets of a computing environment, the method comprising:
-
storing at least one credential in a trusted component of the computing device, the at least one credential identifying both the computing device and a user of the computing device; storing data at the computing environment relating to the computing device and the user in association with the at least one credential, the data indicating which of the assets the computing device is permitted to access when the at least one credential is authenticated; the computing device communicating the at least one credential from the trusted component to the computing environment; and the computing environment selectively granting access requests from the computing device in accordance with the data stored at the computing environment in association with the at least one credential and in accordance with a status of the computing environment determined for the at least one credential communicated by the computing device. - View Dependent Claims (11, 12)
-
Specification