Dell products l.p. (20240137360). METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS

Organization Name

dell products l.p.

Inventor(s)

Sunil Yadav of Bangalore (IN)

Amarendra Behera of Bangalore (IN)

Tushar Dethe of Bangalore (IN)

Shelesh Chopra of Bangalore (IN)

METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240137360 titled 'METHOD AND SYSTEM FOR PERFORMING AUTHENTICATION AND OBJECT DISCOVERY FOR ON-PREMISES CLOUD SERVICE PROVIDERS

Simplified Explanation

The method described in the abstract relates to providing data protection services for limited access cloud data. Here is a simplified explanation of the abstract:

  • Obtaining an initial cloud service provider (CSP) proxy generation request from a user.
  • Creating an authentication account in a CSP directory based on the initial CSP proxy generation request.
  • Instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account.
  • Storing the authentication information.
  • Associating the user with the authentication information and the CSP proxy, allowing access to limited access cloud data and resources.

---

      1. Potential Applications of this Technology

This technology can be applied in industries where secure access to cloud data is crucial, such as healthcare, finance, and government sectors.

      1. Problems Solved by this Technology

This technology addresses the issue of securely accessing limited access cloud data while maintaining data protection and privacy.

      1. Benefits of this Technology

- Enhanced data security and protection - Controlled access to cloud resources - Improved user authentication processes

      1. Potential Commercial Applications of this Technology
        1. Securing Limited Access Cloud Data for Enterprises

This technology can be marketed to enterprises looking to secure their sensitive data stored in the cloud.

      1. Possible Prior Art

One possible prior art could be the use of multi-factor authentication systems in cloud services to enhance security measures.

---

        1. Unanswered Questions
      1. How does this technology compare to existing data protection methods in cloud services?

This article does not provide a direct comparison with existing data protection methods in cloud services, leaving room for further analysis on the effectiveness and efficiency of this technology.

      1. What are the potential limitations or challenges of implementing this method in different cloud environments?

The article does not delve into the potential limitations or challenges that may arise when implementing this method in various cloud environments, warranting further investigation into the adaptability and scalability of the technology.


Original Abstract Submitted

techniques described herein relate to a method for performing data protection services for limited access cloud data. the method includes obtaining, by a data manager, an initial cloud service provider (csp) proxy generation request from a user; in response to obtaining the initial (csp) proxy generation request: creating an authentication account in a csp directory based on the initial csp proxy generation request; instantiating a csp proxy in an on-premises csp using authentication information associated with the authentication account; storing the authentication information; and associating the user with the authentication information and the csp proxy, wherein after the associating the csp proxy can access limited access cloud data and cloud resources of the on-premises csp.