×

Access control using impersonization

  • US 9,699,219 B2
  • Filed: 08/15/2016
  • Issued: 07/04/2017
  • Est. Priority Date: 12/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • an authentication computer system that processes an authentication request by verifying an electronic signature of a first request and provides an authentication response having information identifying a set of computer resources being a cause of the authentication request;

    a first computer resource that receives the first request and, as a result, submits the authentication request to the authentication computer system, receives the authentication response and, as part of fulfilling the first request, uses the authentication response to submit a second request;

    a policy evaluation computer system that evaluates, based at least in part on the information identifying the set of computer resources, a set of policies applicable to the second request to determine a policy determination;

    a second computer resource that receives the second request and processes the second request in accordance with the policy determination; and

    a third computer resource that processes a third request originating from the second computer resource and triggered by the second request, by the first request, and by the authentication request, the processing in accordance with a policy based at least in part on a user profile associated with the authentication request and information identifying a set of computer resources that triggered the third request, including the first and second computer resource.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×