Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-level, distributed access control between services and applications

A server and access strategy technology, applied in electrical components, safety devices, transmission systems, etc., can solve problems such as system security risks and system performance degradation

Active Publication Date: 2019-12-06
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Where services and resources are located on the network, due to the nature of these applications, unfettered access can pose a security risk to the entire system
However, an over-constrained system can lead to performance degradation of the overall system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-level, distributed access control between services and applications
  • Multi-level, distributed access control between services and applications
  • Multi-level, distributed access control between services and applications

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0070] Example 1 is a computing system comprising:

[0071] access policy logic that receives an access request from a requesting service requesting access to a requested component and identifies, based on a set of filter criteria, which of a plurality of different access policies is applied to the access request for the requesting service an access policy, the access policy logic determining whether the access request complies with the identified access policy based on the identified access policy and the access request; and

[0072] token issuing logic that issues an access token to the requesting service in response to the access policy logic determining that the access request complies with the identified access policy.

example 2

[0073] Example 2 is the computing system of any or all of the preceding examples, further comprising the request service, and wherein the request service is configured to send the access request to the requested component along with the access token to Gain access to the requested component.

example 3

[0074] Example 3 is the computing system of any or all of the previous examples, further comprising the requested component comprising:

[0075] application logic configured to service the access request.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computing system controls access between components. A token issuer issues an access token to a requesting component, that is requesting access to a requested service component, based at least in part on an access policy. The requesting component sends the token to the requested service component, which includes a token authentication module that validates the access token and authorizes the requesting component to access a requested service component, and receives the authorization to access the requested service component.

Description

Background technique [0001] Computer systems are currently in widespread use. Some such computer systems run applications that operate from cloud systems. Examples of such applications include document management and sharing systems, cloud-based data storage systems, services such as electronic mail (email) services, word processing applications that generate word processing documents, slide presentation applications that generate slide presentation documents, generate Spreadsheet applications for spreadsheet documents and a variety of other applications. [0002] Such systems and applications often run on cloud networks that include a variety of different services and resources. During operation of these systems and applications, they often access different services and resources located on the network. Likewise, a developer developing a new feature in a system or application may want the new feature to access services and resources to ensure that the new feature operates ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/08H04W12/06H04L29/06
CPCH04L63/0815H04L63/105H04L67/10H04W12/06H04W12/088H04L63/10
Inventor M·莱布曼J·T·亨德里克森G·V·卡普林C·曼内斯库
Owner MICROSOFT TECH LICENSING LLC
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More