发明名称 Authentication and authorization methods for cloud computing platform security
摘要 An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
申请公布号 US9288214(B2) 申请公布日期 2016.03.15
申请号 US201414319235 申请日期 2014.06.30
申请人 International Business Machines Corporation 发明人 Chang David Yu;Benantar Messaoud;Chang John Yow-Chun;Venkataramappa Vishwanath
分类号 H04L29/06;G06F21/62;G06F21/78;H04L29/08 主分类号 H04L29/06
代理机构 代理人 Petrokaitis Joseph;Judson David H.
主权项 1. A method for authentication and authorization in an environment wherein computing resources are hosted in a shared pool of configurable computing resources, comprising: receiving a request from a first entity for access to the shared pool of configurable computing resources managed by a second entity; upon execution of an agreement among the first entity, the second entity and a third entity that is distinct from the first entity and the second entity, assigning the first entity a resource group; receiving and storing in the resource group information associated with permitted users of the first entity; registering a plug-in security module associated with the first entity in a plug-in service operated by the second entity in association with the shared pool of configurable computing resources; enabling access to the resource group via the plug-in security module; and upon receiving a permission to disassociate the first entity from the resource group, returning the resource group to the shared pool.
地址 Armonk NY US