17972367. METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 05:40, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS

Organization Name

Dell Products L.P.

Inventor(s)

Sunil Yadav of Bangalore (IN)

Amarendra Behera of Bangalore (IN)

Tushar Dethe of Bangalore (IN)

Shelesh Chopra of Bangalore (IN)

METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17972367 titled 'METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS

Simplified Explanation

The method described in the abstract relates to a technique for providing data protection services for limited access cloud data. Here are the key points of the innovation:

  • Obtaining an initial cloud service provider (CSP) proxy generation request from a user.
  • Creating an authentication account in a CSP directory based on the initial CSP proxy generation request.
  • Instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account.
  • Storing the authentication information.
  • Associating the user with the authentication information and the CSP proxy, allowing the CSP proxy to access limited access cloud data and cloud resources of the on-premises CSP.

Potential Applications

This technology could be applied in industries where secure access to cloud data is crucial, such as healthcare, finance, and government sectors.

Problems Solved

This method solves the problem of securely accessing limited access cloud data while maintaining data protection and privacy.

Benefits

The benefits of this technology include enhanced data security, improved access control, and better management of cloud resources.

Potential Commercial Applications

A potential commercial application of this technology could be in cloud service providers offering enhanced data protection services to their clients.

Possible Prior Art

One possible prior art could be the use of multi-factor authentication systems in cloud computing to enhance security measures.

Unanswered Questions

How does this method compare to existing data protection techniques in cloud computing?

This article does not provide a direct comparison with existing data protection techniques in cloud computing.

What are the potential limitations or challenges of implementing this method in real-world scenarios?

The article does not address the potential limitations or challenges of implementing this method in real-world scenarios.


Original Abstract Submitted

Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes obtaining, by a data manager, an initial cloud service provider (CSP) proxy generation request from a user; in response to obtaining the initial (CSP) proxy generation request: creating an authentication account in a CSP directory based on the initial CSP proxy generation request; instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account; storing the authentication information; and associating the user with the authentication information and the CSP proxy, wherein after the associating the CSP proxy can access limited access cloud data and cloud resources of the on-premises CSP.