×

Authorizing an action request in a networked computing environment

  • US 10,277,521 B2
  • Filed: 06/04/2013
  • Issued: 04/30/2019
  • Est. Priority Date: 06/04/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for minimizing an effect of a disruptive action in a networked computing environment, comprising:

  • receiving an action request to perform a disruptive action associated with a cloud computing resource, wherein the networked computing environment is a cloud computing environment and the disruptive action is an action that has a potential to have a disruptive effect;

    determining connected systems potentially affected by the requested action from a list of systems capable of being affected by the disruptive action based on a port and a protocol being accessed by the connected systems, the connected systems having an open connection to the cloud computing resource;

    determining actual users of each of the connected systems by referencing a database of the cloud computing environment to find a technical owner of each of the connected systems, wherein the actual users comprise active users having an open connection to the computing resource and being actively engaged with the computing resource, passive users having an open connection to the computing resource but not actively engaged with the computing resource, and inactive users comprising an administrator;

    sending a notification requesting a response to one or more of the actual users, the notification comprising a message selected from the group consisting of;

    an email message, a text message, an instant message, a pop-up window, and a mobile push notification;

    receiving a response to the notification from one or more of the actual users, the response comprising a response activity to be executed by the cloud computing resource, the completion of which is a condition for the user to authorize the requested action, and the response comprising a message selected from the group consisting of;

    an email message, a text message, an instant message, a pop-up window, and a mobile push notification;

    analyzing user data comprising resource usage activity associated with each responding actual user and a role of each responding actual user;

    weighting the response of each responding actual user based on the resource usage activity associated with each responding actual user and the role of each responding actual user, the weighting following a set of rules comprising;

    assigning a higher priority to a response of an actual user having an active connection than to a response of an actual user having an inactive connection, assigning a higher priority to a response of an actual user with a history of database querying than to a response of an actual user having an open but inactive database connection, assigning a higher priority to a response of an actual user performing a database operation than to a response of an actual user having an open but inactive database connection, and assigning a higher priority to a response of an actual user who is an administrator than to a response of an actual user who is not an administrator; and

    determining, based on the weighted responses, whether to grant authorization to perform the requested action, wherein the requested action is performed when authorization is granted and a sufficient failover server is available.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×