18538973. METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES simplified abstract (Intel Corporation)
Contents
- 1 METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES
Organization Name
Inventor(s)
Christopher Son Thach of Ambler PA (US)
Nathan John Heldt-sheller of Portland OR (US)
Radoslaw Benedykt Szulim of Kensington MD (US)
Ned Smith of Beaverton OR (US)
Matthew David Balvin of Beaverton WA (US)
Callum Wilson Noble of Sunnyvale CA (US)
Anand Basalingappa Jyoti of Bangalore (IN)
METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18538973 titled 'METHODS AND APPARATUS FOR IDENTITY AND ACCESS MANAGEMENT ON NETWORKED MACHINES
Simplified Explanation
Methods and apparatus for identity and access management on networked machines are disclosed in this patent application. The invention involves granting permissions based on user identities to enable remote access and command execution on networked devices.
- The patent application describes instructions stored on a machine-readable storage medium that allow programmable circuitry to grant permission for a connection between a remote compute device and a local compute device based on user identities.
- The connection enables the first account to operate the local compute device by impersonating a second user associated with a different identity.
- The instructions also include determining whether permission is to be granted to execute a command on the remote compute device based on the user identities involved.
Potential Applications
This technology could be applied in various industries such as cybersecurity, IT management, and remote access solutions.
Problems Solved
This technology solves the problem of securely managing user identities and access permissions on networked machines, ensuring that only authorized users can operate devices and execute commands remotely.
Benefits
The benefits of this technology include enhanced security, improved access control, and streamlined identity management processes on networked machines.
Potential Commercial Applications
Potential commercial applications of this technology include cybersecurity software, remote access tools, and identity management solutions for businesses.
Possible Prior Art
One possible prior art for this technology could be existing identity and access management systems used in IT environments to control user permissions and access to networked resources.
Unanswered Questions
How does this technology handle user authentication for remote access?
The patent application does not provide detailed information on the specific authentication methods used for granting permissions based on user identities.
What types of commands can be executed on the remote compute device using this technology?
The patent application does not specify the range of commands that can be executed on the remote compute device once permission is granted based on user identities.
Original Abstract Submitted
Methods and apparatus for identity and access management on networked machines are disclosed herein. An example non-transitory machine readable storage medium includes instructions to cause programmable circuitry to at least grant first permission to form a connection between a remote compute device and a local compute device based on a first identity of a first account, the connection to enable the first account to operate the local compute device by impersonating a second user, the second user associated with a second identity, access a request to execute a command on the remote compute device from the first account, and determine, based on the first identity of the first account and the second identity of the second user, whether second permission is to be granted to execute the command.
- Intel Corporation
- Christopher Son Thach of Ambler PA (US)
- Nathan John Heldt-sheller of Portland OR (US)
- Radoslaw Benedykt Szulim of Kensington MD (US)
- Ned Smith of Beaverton OR (US)
- Matthew David Balvin of Beaverton WA (US)
- Callum Wilson Noble of Sunnyvale CA (US)
- Anand Basalingappa Jyoti of Bangalore (IN)
- H04L9/40