×

Method and apparatus for community management in remote system servicing

  • US 6,584,454 B1
  • Filed: 12/31/1999
  • Issued: 06/24/2003
  • Est. Priority Date: 12/31/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for allowing access to a protected software application by a remote system user via a network, comprising the steps of:

  • storing a community management database at a central facility, said community management database comprising, for each one of a plurality of protected software applications, a respective rule for defining a community of members entitled to access the respective protected software application, and further comprising information for a plurality of variables, each variable of said plurality belonging to one of the following categories;

    remote system information variables, remote system site variables, remote system variables, and remote system contract variables, each of said rules being a function of one or more of said variables;

    said remote system user sending a request for access to a particular protected software application, said request being sent to a server that can provide access to said particular protected software application via said network;

    said remote system user sending a user identification and a password to said server via said network;

    said server in turn sending said user identification and said password to said central facility;

    said central facility determining whether said password is authentic;

    said central facility determining whether said remote system user is authorized to access said particular protected software application; and

    allowing said remote system user to access said particular protected software application if a number of conditions are met, said conditions including at least the following;

    said password is authentic and said remote system user is authorized to access said particular protected software application, wherein said step of determining whether said remote system user is authorized comprises the following steps;

    retrieving a particular rule corresponding to said particular protected software application from said community management database;

    retrieving information for one or more variables from said community management database, said information being related to said user identification; and

    determining whether said retrieved variable information satisfies said retrieved rule, access being not authorized if said retrieved variable information does not satisfy said retrieved rule.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×