SECURED AUTHORIZATION FOR DEMAND RESPONSE

Various embodiments set forth a method comprising validating, by a first computing system in a secured computing environment, a demand event generated by an operator, where the operator is authenticated to generate demand events within the secured computing environment and the demand event correspon...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: DAMM, Benjamin N, REEVES, III, Donald Lloyd, GLASENAPP, Aaron, BARBOUR, Thomas J, BRADBURY, Connie
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Various embodiments set forth a method comprising validating, by a first computing system in a secured computing environment, a demand event generated by an operator, where the operator is authenticated to generate demand events within the secured computing environment and the demand event corresponds to a set of endpoints operating outside the secured computing environment, generating, by the first computing system, an authorization permit associated with the demand event, and sending, from the first computing system to a second computing system outside of the secured computing environment, (i) an indicator of the demand event, and (ii) the authorization permit, where the demand event is usable by the second computing system to generate a demand event command for the set of endpoints, and the authorization permit is usable by the set of endpoints to validate the demand event command