Prioritized token based arbiter and method
First Claim
1. An apparatus comprising:
- a limited resource comprising;
one or more processors that are configured to analyze arbiter metrics included in secured tokens associated with one or more users seeking access to the limited resource; and
memory coupled to the one or more processors comprising one or more instructions executable at the one or more processors, the one or more processors operable when executing the instructions to;
receive, from each of one or more user devices associated with the one or more users, a secured token issued by a network element, the secured token comprising at least an absolute preemptive metric;
determine a highest preemptive right user among the one or more users seeking access to the limited resource by reading the absolute preemptive metric included in each secured token associated with the one or more users; and
allow the user having the highest preemptive right to have exclusive access to the limited resource.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for employing a token based arbiter. The apparatus includes a priority provider (26) comprising a processor for calculating an arbiter metric and an identity provider (18) having a processor for embedding the metric into a secured token. The apparatus also comprises memory coupled to the processor having one or more instructions executable at the processor. The processor is operable when executing the instructions to: collect authorization attributes (A) from one or more users seeking use of a resource (20) associated with a service provider; determine the level of priority to the one or more users based on prescribed policy of the priority provider; assign at least one arbiter metric (22, 32) to a secured token (T) for each of the one or more users based on the level of priority identified by the priority provider.
-
Citations
20 Claims
-
1. An apparatus comprising:
-
a limited resource comprising; one or more processors that are configured to analyze arbiter metrics included in secured tokens associated with one or more users seeking access to the limited resource; and memory coupled to the one or more processors comprising one or more instructions executable at the one or more processors, the one or more processors operable when executing the instructions to; receive, from each of one or more user devices associated with the one or more users, a secured token issued by a network element, the secured token comprising at least an absolute preemptive metric; determine a highest preemptive right user among the one or more users seeking access to the limited resource by reading the absolute preemptive metric included in each secured token associated with the one or more users; and allow the user having the highest preemptive right to have exclusive access to the limited resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 19)
-
-
11. A method for arbitrating access between users to a resource, the method comprising the steps of:
-
embedding an arbiter metric into a secured token, wherein the secured token is embedded into a non-transient computer readable medium by one or more processors of one or more network elements, the arbiter metric comprising a preemptive right associated with the user when attempting to access a resource; embedding attributes into the secured token with the one or more processors, the attributes comprising at least one of authorization rights and authentication rights associated with the user attempting to access the resource; conveying, by the one or more network elements, the secured token to a user device associated with the user; receiving, by another network element from the user device when attempting to access the resource, the secured token, wherein the secured token comprises the preemptive right associated with the user and the attributes comprising at least one of authorization rights and authentication rights associated with the user; in response to receiving the secured tokens from the user device, reading, by the another network element, at least one of the attributes in the secured token relative to one or more users seeking use of the resource and determining a first level of access based on the attribute; and determining, by the another network element, which user of the one or more users attempting to access the resource cleared from the first level of access is entitled to exclusive access among the users to the resource based on the preemptive right in the secured token. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system for arbitrating access between users of a resource, the system comprising:
-
a network-based priority provider having one or more processors for calculating an arbiter metric comprising a preemptive right; a network-based identity provider having one or more processors for embedding attributes into a secured token, the attributes comprising at least one of authorization rights and authentication rights, and the arbiter metric; and one or more of a service provider and a resource that is configured to; receive the secured token from a user device; recognize at least one of the attributes in the secured token relative to one or more users seeking use of a resource; and determine the level of access to the one or more users based on the priority right or preemptive right in the secured token relative to each user seeking access to the resource. - View Dependent Claims (18, 20)
-
Specification