Protecting user identity at a cloud using a distributed user identity system
First Claim
Patent Images
1. A method comprising:
- assigning, by a server computer system, an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a user request to access a cloud, wherein the anonymous cloud account does not reveal an identity of the user to the cloud;
creating mapping data associating the user with the anonymous cloud account, wherein the mapping data is not made available to the cloud;
receiving, from the cloud, cloud access pattern data associated with the anonymous cloud account that does not reveal the identity of the user to the cloud; and
correlating, by the server computer system, the cloud access pattern data received from the cloud with the mapping data to identify the user that accessed cloud content specified in the cloud access pattern data.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing system assigns an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a request to access a cloud. The anonymous cloud account does not reveal an identity of the user to the cloud. The computing system creates mapping data that associates the user with the anonymous cloud account. The cloud does not have access to the mapping data. The computing system facilitates user access to the cloud based on the anonymous cloud account. The cloud generates cloud access pattern data for the anonymous cloud account without determining the identity of the user.
109 Citations
20 Claims
-
1. A method comprising:
-
assigning, by a server computer system, an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a user request to access a cloud, wherein the anonymous cloud account does not reveal an identity of the user to the cloud; creating mapping data associating the user with the anonymous cloud account, wherein the mapping data is not made available to the cloud; receiving, from the cloud, cloud access pattern data associated with the anonymous cloud account that does not reveal the identity of the user to the cloud; and correlating, by the server computer system, the cloud access pattern data received from the cloud with the mapping data to identify the user that accessed cloud content specified in the cloud access pattern data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a memory; and a processing device coupled with the memory to; assign an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a user request to access a cloud, wherein the anonymous cloud account does not reveal an identity of the user to the cloud; create mapping data associating the user with the anonymous cloud account, wherein the mapping data is not made available to the cloud; receive, from the cloud, cloud access pattern data associated with the anonymous cloud account that does not reveal the identity of the user to the cloud; and correlate the cloud access pattern data received from the cloud with the mapping data to identify the user that accessed cloud content specified in the cloud access pattern data. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to perform a method comprising:
-
assigning, by the processing device, an anonymous cloud account to a user in response to a determination that identity information of the user is validated for a user request to access a cloud, wherein the anonymous cloud account does not reveal an identity of the user to the cloud; creating mapping data associating the user with the anonymous cloud account, wherein the mapping data is not made available to the cloud; receiving, from the cloud, cloud access pattern data associated with the anonymous cloud account that does not reveal the identity of the user to the cloud; and correlating the cloud access pattern data received from the cloud with the mapping data to identify the user that accessed cloud content specified in the cloud access pattern data. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification