US Patent Application 17662242. ACCESS CONFIGURATION IN HYBRID NETWORK ENVIRONMENTS simplified abstract

From WikiPatents
Jump to navigation Jump to search

ACCESS CONFIGURATION IN HYBRID NETWORK ENVIRONMENTS

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION


Inventor(s)

Qian Xia Song of Beijing (CN)

Xiao Ling Chen of Beijing (CN)

Ai Ping Feng of Beijing (CN)

CHUN LI Jia of Beijing (CN)

Jin Jin Yang of Beijing (CN)

Kui Zhang of TianJin City (CN)

Dong Chen of Beijing (CN)

ACCESS CONFIGURATION IN HYBRID NETWORK ENVIRONMENTS - A simplified explanation of the abstract

This abstract first appeared for US patent application 17662242 titled 'ACCESS CONFIGURATION IN HYBRID NETWORK ENVIRONMENTS

Simplified Explanation

The patent application describes a method, systems, and computer program products for access configuration in hybrid network environments.

  • The method involves receiving an access configuration request from a client device in one network environment, which is associated with accessing a network resource in another network environment.
  • The access configuration request includes authentication information related to the client device.
  • The method also involves obtaining authentication information associated with the network resource.
  • The first and second authentication information are used to verify the access configuration request.
  • If the request is verified, the method allows for the automatic establishment of connectivity between the client device and the network resource.


Original Abstract Submitted

Method, systems, and computer program products for access configuration in hybrid network environments are disclosed. According to the method, an access configuration request is received from a client device in a first network environment, wherein the access configuration request is associated with an access to a network resource in a second network environment and comprises first authentication information associated with the client device. Further, second authentication information associated with the network resource is obtained. The first and second authentication information is further used to determine whether the access configuration request is verified. If the access configuration request is verified, connectivity between the client device and the network resource can be automatically established.