Salesforce, inc. (20240380752). DELEGATION BASED ACCESS TO SECURE SYSTEMS simplified abstract

From WikiPatents
Jump to navigation Jump to search

DELEGATION BASED ACCESS TO SECURE SYSTEMS

Organization Name

salesforce, inc.

Inventor(s)

Adarsh Khare of Sammaamish WA (US)

Shruthi Chikkanna of Issaquah WA (US)

Peixuan Jiang of Bellevue WA (US)

Isaac Westlund of Seattle WA (US)

Hideyuki Komaki of Bellevue WA (US)

Hayk Baluyan of Bellevue WA (US)

Giridharan Sridharan of Bellevue WA (US)

Mitchell Brent Dinicola of Sammamish WA (US)

Ajay Thargan of Bellevue WA (US)

DELEGATION BASED ACCESS TO SECURE SYSTEMS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240380752 titled 'DELEGATION BASED ACCESS TO SECURE SYSTEMS

The system described in the patent application allows users to authenticate themselves using an authentication device, such as a smart card, and then access a personalized virtual machine without the need for repeated authentication.

  • The system generates an access token during user authentication.
  • A personalized virtual machine is assigned to the user.
  • The access token is exchanged for a temporary certificate with an expiry time.
  • The temporary certificate, containing verifiable user identity, is provided to the personalized virtual machine.
  • The user is granted access to the personalized virtual machine.
  • The user can connect to various systems without re-authenticating using the authentication device.
  • Subsequent connection requests are denied after the expiry time of the temporary certificate.

Potential Applications: - Secure access control systems - Remote work environments - Cloud computing services

Problems Solved: - Eliminates the need for repeated authentication - Enhances user convenience and security

Benefits: - Streamlined access to multiple systems - Improved user experience - Enhanced security measures

Commercial Applications: Title: Secure Access Control System for Remote Work Environments This technology can be utilized by companies offering remote work solutions to ensure secure and efficient access to their systems.

Prior Art: Further research can be conducted in the field of secure authentication systems and virtual machine technology to explore similar innovations.

Frequently Updated Research: Stay updated on advancements in secure authentication methods and virtual machine technologies to enhance the system's capabilities.

Questions about the System: 1. How does the system ensure the security of user identity during the authentication process? 2. What measures are in place to prevent unauthorized access to the personalized virtual machine?


Original Abstract Submitted

a system receives an access token generated by a user performing authentication via an authentication device, for example, a smart card. the system obtains a personalized virtual machine assigned to the user. the system exchanges the access token for a temporary certificate having an expiry time. the system provides the temporary certificate that includes verifiable user identity to a personalized virtual machine. the system provides the user with access to the personalized virtual machine. the system allows the user to present verifiable user identity and connect to any of a plurality of systems without requiring the user to authenticate again using the authentication device. after the expiry time of the temporary certificate is exceeded, the system denies subsequent requests from the user to connect to any of the plurality of systems.