US Patent Application 18221458. SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS

Organization Name

Capital One Services, LLC


Inventor(s)

Ron Meck of Toano VA (US)

Clayton Mottley of McLean VA (US)

Abhishek Mathews of McLean VA (US)

Tianzhen Lin of Fairfax VA (US)

Stephen Sherrard of McLean VA (US)

SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18221458 titled 'SYSTEM AND METHOD FOR ACCESS MANAGEMENT FOR APPLICATIONS

Simplified Explanation

The patent application describes a system and method for managing access to applications in a cloud computing environment.

  • The system scans the actions performed by an application code on resources in the cloud computing environment.
  • It identifies the existing set of permissions for these resources.
  • Based on the actions performed, it identifies the permissions accessed by the application code.
  • A new set of permissions is generated by combining the existing set and the accessed permissions.
  • The new set of permissions is stored in a database for later retrieval.
  • When the application code is executed in a production environment, the new set of permissions is applied to the resources.


Original Abstract Submitted

A system and method for access management for applications is disclosed. The system and method includes at least: initializing, at execution time of an application code, a scan of actions performed by the application code on resources of a cloud computing environment; identifying an existing set of permissions for the resources; identifying one or more accessed permissions by the application code based on the actions performed by the application code on the resources; generating a new set of permissions for accessing the resources based on the identifying the existing set of permissions and the one or more accessed permissions; transmitting the new set of permissions to a database for storage and later retrieval; and applying the new set of permissions to the resources when the application code is executed in a production environment.