18538973. METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES simplified abstract (Intel Corporation)

From WikiPatents
Jump to navigation Jump to search

METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES

Organization Name

Intel Corporation

Inventor(s)

Christopher Son Thach of Ambler PA (US)

Nathan John Heldt-sheller of Portland OR (US)

Radoslaw Benedykt Szulim of Kensington MD (US)

Ned Smith of Beaverton OR (US)

Matthew David Balvin of Beaverton WA (US)

Callum Wilson Noble of Sunnyvale CA (US)

Anand Basalingappa Jyoti of Bangalore (IN)

METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18538973 titled 'METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES

Simplified Explanation

Methods and apparatus for identity and access management on networked machines are disclosed in this patent application. The invention involves granting permissions based on user identities to enable remote access and command execution on networked devices.

  • The patent application describes instructions stored on a machine-readable storage medium that allow programmable circuitry to grant permission for a connection between a remote compute device and a local compute device based on user identities.
  • The connection enables the first account to operate the local compute device by impersonating a second user associated with a different identity.
  • The instructions also include determining whether permission is to be granted to execute a command on the remote compute device based on the user identities involved.

Potential Applications

This technology could be applied in various industries such as cybersecurity, IT management, and remote access solutions.

Problems Solved

This technology solves the problem of securely managing user identities and access permissions on networked machines, ensuring that only authorized users can operate devices and execute commands remotely.

Benefits

The benefits of this technology include enhanced security, improved access control, and streamlined identity management processes on networked machines.

Potential Commercial Applications

Potential commercial applications of this technology include cybersecurity software, remote access tools, and identity management solutions for businesses.

Possible Prior Art

One possible prior art for this technology could be existing identity and access management systems used in IT environments to control user permissions and access to networked resources.

Unanswered Questions

How does this technology handle user authentication for remote access?

The patent application does not provide detailed information on the specific authentication methods used for granting permissions based on user identities.

What types of commands can be executed on the remote compute device using this technology?

The patent application does not specify the range of commands that can be executed on the remote compute device once permission is granted based on user identities.


Original Abstract Submitted

Methods and apparatus for identity and access management on networked machines are disclosed herein. An example non-transitory machine readable storage medium includes instructions to cause programmable circuitry to at least grant first permission to form a connection between a remote compute device and a local compute device based on a first identity of a first account, the connection to enable the first account to operate the local compute device by impersonating a second user, the second user associated with a second identity, access a request to execute a command on the remote compute device from the first account, and determine, based on the first identity of the first account and the second identity of the second user, whether second permission is to be granted to execute the command.