The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 07, 2014
Filed:
Dec. 04, 2009
Alan P. Dooley, Poughkeepsie, NY (US);
Walter B. Farrell, Woodstock, NY (US);
Arthur L. Fitzpatrick, Iii, Port Ewen, NY (US);
Richard H. Guski, Red Hook, NY (US);
Russell D. Hardgrove, Poughkeepsie, NY (US);
Deborah F. Mapes, Port Ewen, NY (US);
Christine A. Marusek, Red Hook, NY (US);
Mark A. Nelson, Poughkeepsie, NY (US);
Eric Rosenfeld, Pleasant Valley, NY (US);
Alan P. Dooley, Poughkeepsie, NY (US);
Walter B. Farrell, Woodstock, NY (US);
Arthur L. Fitzpatrick, III, Port Ewen, NY (US);
Richard H. Guski, Red Hook, NY (US);
Russell D. Hardgrove, Poughkeepsie, NY (US);
Deborah F. Mapes, Port Ewen, NY (US);
Christine A. Marusek, Red Hook, NY (US);
Mark A. Nelson, Poughkeepsie, NY (US);
Eric Rosenfeld, Pleasant Valley, NY (US);
International Business Machines Corporation, Armonk, NY (US);
Abstract
Processing within a computing environment is facilitated by: determining by a local security manager of a first system in a first security domain whether a local security context of a user is acceptable to a second system in a second security domain; responsive to the user's security context being unacceptable to the second system, creating by a local security manager of the second system a runtime security context for the user in the second system; and providing the first system with a reference to the runtime security context for the user in the second system which is resolvable within the computing environment or a portable representation of the runtime security context for the user in the second system, the reference or the portable representation being subsequently returned to the second system with a request from the first system to process work at the second system.