17963134. AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION simplified abstract (Oracle International Corporation)
Contents
- 1 AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION
Organization Name
Oracle International Corporation
Inventor(s)
Mauruthi Geetha Mohan of Seattle WA (US)
Anthony Long of Edmonds WA (US)
Mina Michel Gorgy Anes of Bothell WA (US)
Sanjeeb Kumar Sahoo of Pleasanton CA (US)
Yingyu Yang of Bellevue WA (US)
Bakhtiyar Uddin of Leander TX (US)
Thomas James Andrews of Seattle WA (US)
AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17963134 titled 'AUTHORIZATION BETWEEN INTEGRATED CLOUD PRODUCTS USING ASSOCIATION
Simplified Explanation
The techniques described in this patent application relate to authorization between integrated cloud products. The process involves receiving a request for permission to access a certificate to verify a requestor's identity, transmitting a request to authorize access to the certificate, receiving authorization from the second resource, granting permission to access the certificate, and generating an association object between the first resource and the certificate.
- Simplified Explanation:
- Authorization process between cloud products for accessing a certificate to verify identity.
- Explanation:
- Receiving a request for permission to access a certificate. - Transmitting a request to authorize access to the certificate. - Receiving authorization from the second resource. - Granting permission to access the certificate. - Generating an association object between the first resource and the certificate.
Potential Applications
This technology could be applied in secure authentication processes, access control systems, and identity verification services.
Problems Solved
This technology solves the problem of securely authorizing access to sensitive information such as certificates for identity verification.
Benefits
The benefits of this technology include enhanced security, streamlined authorization processes, and improved identity verification mechanisms.
Potential Commercial Applications
A potential commercial application of this technology could be in cloud security services for businesses, identity verification platforms, and access control systems.
Possible Prior Art
One possible prior art could be existing authorization protocols and systems used in cloud computing environments.
Unanswered Questions
How does this technology compare to existing authorization methods in terms of efficiency and security?
This article does not provide a direct comparison to existing authorization methods in terms of efficiency and security. Further research or testing would be needed to determine the specific advantages of this technology over existing methods.
What are the potential limitations or vulnerabilities of this authorization process that need to be addressed?
The article does not address potential limitations or vulnerabilities of this authorization process. Further analysis or testing may be required to identify and mitigate any potential weaknesses in the system.
Original Abstract Submitted
Techniques described herein relate to authorization between integrated cloud products. An example includes receiving, by a computing device and from a first resource, a first request for permission to access a certificate to verify a requestor's identity. The computing device can transmit a second request to a second resource to authorize permitting access to the certificate. The computing device can receive a response from the second resource comprising an authorization to permit access to the certificate. The computing device can grant permission to the first resource to access the certificate, wherein the first resource is configured to verify the requestor's identity based on accessing the certificate. The computing device can receive a third request from the first resource to generate an association object between the first resource and the certificate. The computing device can generate the association object, wherein the association object associates the first resource and the certificate.