Authorizations for computing devices to access a protected resource
Abstract:
Authorization technology queries a user of an authorizing computing device for permission to allow another user of a requesting computing device to have access to a protected resource of the user. A requesting computing device may access a protected resource of the user by requesting authorization information for accessing the protected resource from an authorization manager server. Requesting and authorizing computing devices have respective agents for communicating with an authorization manager server as well as users and applications. An authorization manager server may provide the authorization information (or limited authorization) to the requesting computing device after the authorization manager server queries the user of the authorizing computing device for permission and receives permission from the authorizing computing device (via user input). The authorization information may limit access to the protected resource, such as limiting an amount of time to access and/or limiting an amount to charge an account.
Information query
Patent Agency Ranking
0/0