Ad-hoc user account creation
First Claim
Patent Images
1. A method for a first computerized apparatus to control access to resources by a second computerized apparatus, the method comprising:
- at the first computerized apparatus;
receiving a resource request from the second computerized apparatus, the resource request at least comprising a trusted token from the second computerized apparatus and a calling card, the trusted token containing identity data of a user of the first computerized apparatus;
determining when the resource request is authorized to access at least the requested resource, wherein the determining comprises;
extracting information from the calling card as determined by a rules engine of the first computerized apparatus, andapplying one or more conditions of the rules engine on the extracted information; and
creating an ad-hoc user account configured to access the requested resource by the second computerized apparatus upon a determination of authorized access, the ad-hoc user account comprising at least the identity data, wherein creating the ad-hoc user account is characterized by automatic creation in response to the resource request.
0 Assignments
0 Petitions
Accused Products
Abstract
A mechanism that allows a user to easily configure a rules engine to apply rules to decide which requests for access to a user'"'"'s computer resources are to be granted and which are denied. A trusted token, such as a certificate of identity issued by a trusted third party authority that verifies identities of computer users, is included in a calling card object provided by the requesting user to the (server) computer that controls the resources desired by the requester. Additional conditions for access may be specified as desired by the user of the server computer.
9 Citations
20 Claims
-
1. A method for a first computerized apparatus to control access to resources by a second computerized apparatus, the method comprising:
-
at the first computerized apparatus; receiving a resource request from the second computerized apparatus, the resource request at least comprising a trusted token from the second computerized apparatus and a calling card, the trusted token containing identity data of a user of the first computerized apparatus; determining when the resource request is authorized to access at least the requested resource, wherein the determining comprises; extracting information from the calling card as determined by a rules engine of the first computerized apparatus, and applying one or more conditions of the rules engine on the extracted information; and creating an ad-hoc user account configured to access the requested resource by the second computerized apparatus upon a determination of authorized access, the ad-hoc user account comprising at least the identity data, wherein creating the ad-hoc user account is characterized by automatic creation in response to the resource request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computerized apparatus, comprising:
-
a network interface; a processor in data communication with the network interface; and a storage apparatus in data communication with the processor, the storage apparatus having a plurality of instructions stored thereon that are configured to, when executed by the processor; generate a data structure comprising at least a trusted token containing identity information of a user of the computerized apparatus, the data structure generated via a rules engine configured according to one or more criteria; establish a connection to a remote computerized apparatus using the network interface; transmit a request via the connection to access at least one resource managed by the remote computerized apparatus, the request comprising at least the data structure; and access the at least one resource, where the at least one resource is accessed based on establishing an ad-hoc user account comprising at least the identity information, wherein; establishing the ad-hoc user account comprises automatic creation of the ad-hoc user account in response to the request to access the at least one resource, the transmitted data structure is configured to enable establishing the ad-hoc user account upon authentication of the trusted token, and generating the data structure is triggered by a previously denied request to the at least one resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing executable instructions that, when executed by a processor included in a first computerized apparatus, cause the first computerized apparatus to carry out steps that include:
-
receiving a resource request from a second computerized apparatus, the resource request comprising at least a user identifier and a digital certificate; applying one or more access criteria against the resource request to determine an authorization to access the requested resource according to a rules engine; and creating an ad-hoc user account to enable access to the requested resource by the second computerized apparatus upon a determination that the resource request is authorized, the ad-hoc user account containing at least the user identifier, wherein; creating the ad-hoc user account is characterized by automatic creation in response to the resource request without requiring additional user interaction, and at least one of the one or more access criteria comprises a frequency of contact initiation condition. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification