×

Maintaining user identity associated with access to network resources using virtual machines

  • US 9,658,872 B1
  • Filed: 05/03/2012
  • Issued: 05/23/2017
  • Est. Priority Date: 05/03/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a server in a computer system from a user of the computer system, a request for access to a network resource in a legacy system, wherein the request includes a user identifier value that identifies the user, and wherein the legacy system is incapable of tracking the user identifier value;

    upon receiving the request for access to the network resource in the legacy system from the user, determining, by the server of the computer system, whether at least one of a plurality of virtual machines that are uniquely associated with the user identifier value is running in a virtual machine environment of the computer system;

    based on the at least one of the plurality of virtual machines not running in the virtual machine environment, instantiating, by the server of the computer system and in the virtual machine environment of the computer system, one or more virtual machines that are uniquely associated with the user identifier value and that are used only by the user, wherein the one or more virtual machines are configured to provide the user with access to the network resource in the legacy system;

    processing, by the one or more virtual machines in the virtual machine environment of the computer system, the request for access to the network resource in the legacy system, wherein processing the request for access comprises performing one or more data requests to the network resource in the legacy system for the user without including the user identifier value in the one or more data requests;

    storing, by the one or more virtual machines in the virtual machine environment of the computer system, a record of the one or more data requests to the network resource in the legacy system performed by the one or more virtual machines in a log file associated with the one or more virtual machines, wherein the log file stores the user identifier value that identifies the only user of the one or more virtual machines; and

    identifying, by the server in the computer system and to an administrator of the computer system, the user associated with the one or more data requests to the network resource in the legacy system based on the user identifier value stored in the log file associated with the one or more virtual machines.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×