Secure system access
First Claim
Patent Images
1. A method of managing access to secure resources, the method including:
- providing an schema of rights in respect of secure resources; and
, delegating to one or more users an ability to delegate a profile of selected rights in respect of one or more individual secure resources.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of managing access to secure resources (4-9), the method including: providing an schema of permission rights in respect of secure resources; and, delegating to one or more users an ability to delegate (32) a profile (31) of selected permission rights in respect of one or more secure resources.
51 Citations
34 Claims
-
1. A method of managing access to secure resources, the method including:
-
providing an schema of rights in respect of secure resources; and
,delegating to one or more users an ability to delegate a profile of selected rights in respect of one or more individual secure resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 29, 30, 31, 32, 33, 34)
-
-
19. A method of allowing a secure access to a remote system via a network, the method including:
-
(a) storing in a central server a database of permission rights for a plurality of secure resources hosted at one or more remote servers;
(b) receiving an access request for access to one of the secure resources from one of the plurality of remote servers, (c) establishing the identity of a user making the access request;
(d) determining whether the user has permission rights which are sufficient to allow the user to access the one secure resource; and
(e) approving or declining the access request if the permission rights of the user are or are not sufficient to allow the user to access the one secure resource. - View Dependent Claims (20)
-
-
21. A method of allowing secure access to a remote system via a network, the method including:
-
(a) receiving a request for access to a secure resource;
(b) establishing the identity of a user making said access request;
(c) determining whether the user has permission rights which are sufficient to allow the user to access the secure resource; and
of (d) approving or declining said access request if the permission rights of the user are or are not sufficient to allow the user to access the secure resource;
wherein the secure resource is hosted at a remote server, and requests for access to the secure resource are received at the remote server and redirected to a central server. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
Specification