17963134. AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION simplified abstract (Oracle International Corporation)

From WikiPatents
Revision as of 03:50, 16 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION

Organization Name

Oracle International Corporation

Inventor(s)

Mauruthi Geetha Mohan of Seattle WA (US)

Anthony Long of Edmonds WA (US)

Mina Michel Gorgy Anes of Bothell WA (US)

Sanjeeb Kumar Sahoo of Pleasanton CA (US)

Yingyu Yang of Bellevue WA (US)

Bakhtiyar Uddin of Leander TX (US)

Thomas James Andrews of Seattle WA (US)

AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17963134 titled 'AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION

Simplified Explanation

The techniques described in this patent application relate to authorization between integrated cloud products. The process involves receiving a request for permission to access a certificate to verify a requestor's identity, transmitting a request to authorize access to the certificate, receiving authorization from the second resource, granting permission to access the certificate, and generating an association object between the first resource and the certificate.

  • Simplified Explanation:
  - Authorization process between cloud products for accessing a certificate to verify identity.
  • Explanation:
  - Receiving a request for permission to access a certificate.
  - Transmitting a request to authorize access to the certificate.
  - Receiving authorization from the second resource.
  - Granting permission to access the certificate.
  - Generating an association object between the first resource and the certificate.

Potential Applications

This technology could be applied in secure authentication processes, access control systems, and identity verification services.

Problems Solved

This technology solves the problem of securely authorizing access to sensitive information such as certificates for identity verification.

Benefits

The benefits of this technology include enhanced security, streamlined authorization processes, and improved identity verification mechanisms.

Potential Commercial Applications

A potential commercial application of this technology could be in cloud security services for businesses, identity verification platforms, and access control systems.

Possible Prior Art

One possible prior art could be existing authorization protocols and systems used in cloud computing environments.

Unanswered Questions

How does this technology compare to existing authorization methods in terms of efficiency and security?

This article does not provide a direct comparison to existing authorization methods in terms of efficiency and security. Further research or testing would be needed to determine the specific advantages of this technology over existing methods.

What are the potential limitations or vulnerabilities of this authorization process that need to be addressed?

The article does not address potential limitations or vulnerabilities of this authorization process. Further analysis or testing may be required to identify and mitigate any potential weaknesses in the system.


Original Abstract Submitted

Techniques described herein relate to authorization between integrated cloud products. An example includes receiving, by a computing device and from a first resource, a first request for permission to access a certificate to verify a requestor's identity. The computing device can transmit a second request to a second resource to authorize permitting access to the certificate. The computing device can receive a response from the second resource comprising an authorization to permit access to the certificate. The computing device can grant permission to the first resource to access the certificate, wherein the first resource is configured to verify the requestor's identity based on accessing the certificate. The computing device can receive a third request from the first resource to generate an association object between the first resource and the certificate. The computing device can generate the association object, wherein the association object associates the first resource and the certificate.