CONTROL OF ACCESS TO COMPUTING RESOURCES IMPLEMENTED IN ISOLATED ENVIRONMENTS

A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CONTI, Chiara, FREDDI, Remo, RAGUSA, Roberto, ASARO, Alessandra
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator CONTI, Chiara
FREDDI, Remo
RAGUSA, Roberto
ASARO, Alessandra
description A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated from the secondary computing environment) detects an indication of a positive result of the verification of the access request; in response thereto, the main computing environment verifies an integrity condition of the secondary computing environment and then authorizes the secondary computing environment to access the computing resources accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP4423645A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP4423645A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP4423645A13</originalsourceid><addsrcrecordid>eNrjZPB19vcLCfL3UfB3U3B0dnYNDlYI8Vdw9vcNCA3x9HNXCHIN9g8NAoorePoG-Lj6uvqFuLooePopeAb7-ziC2K5-YZ5B_n4gmWAeBta0xJziVF4ozc2g4OYa4uyhm1qQH59aXJCYnJqXWhLvGmBiYmRsZmLqaGhMhBIAttwuOA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CONTROL OF ACCESS TO COMPUTING RESOURCES IMPLEMENTED IN ISOLATED ENVIRONMENTS</title><source>esp@cenet</source><creator>CONTI, Chiara ; FREDDI, Remo ; RAGUSA, Roberto ; ASARO, Alessandra</creator><creatorcontrib>CONTI, Chiara ; FREDDI, Remo ; RAGUSA, Roberto ; ASARO, Alessandra</creatorcontrib><description>A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated from the secondary computing environment) detects an indication of a positive result of the verification of the access request; in response thereto, the main computing environment verifies an integrity condition of the secondary computing environment and then authorizes the secondary computing environment to access the computing resources accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240904&amp;DB=EPODOC&amp;CC=EP&amp;NR=4423645A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240904&amp;DB=EPODOC&amp;CC=EP&amp;NR=4423645A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CONTI, Chiara</creatorcontrib><creatorcontrib>FREDDI, Remo</creatorcontrib><creatorcontrib>RAGUSA, Roberto</creatorcontrib><creatorcontrib>ASARO, Alessandra</creatorcontrib><title>CONTROL OF ACCESS TO COMPUTING RESOURCES IMPLEMENTED IN ISOLATED ENVIRONMENTS</title><description>A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated from the secondary computing environment) detects an indication of a positive result of the verification of the access request; in response thereto, the main computing environment verifies an integrity condition of the secondary computing environment and then authorizes the secondary computing environment to access the computing resources accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPB19vcLCfL3UfB3U3B0dnYNDlYI8Vdw9vcNCA3x9HNXCHIN9g8NAoorePoG-Lj6uvqFuLooePopeAb7-ziC2K5-YZ5B_n4gmWAeBta0xJziVF4ozc2g4OYa4uyhm1qQH59aXJCYnJqXWhLvGmBiYmRsZmLqaGhMhBIAttwuOA</recordid><startdate>20240904</startdate><enddate>20240904</enddate><creator>CONTI, Chiara</creator><creator>FREDDI, Remo</creator><creator>RAGUSA, Roberto</creator><creator>ASARO, Alessandra</creator><scope>EVB</scope></search><sort><creationdate>20240904</creationdate><title>CONTROL OF ACCESS TO COMPUTING RESOURCES IMPLEMENTED IN ISOLATED ENVIRONMENTS</title><author>CONTI, Chiara ; FREDDI, Remo ; RAGUSA, Roberto ; ASARO, Alessandra</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP4423645A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>CONTI, Chiara</creatorcontrib><creatorcontrib>FREDDI, Remo</creatorcontrib><creatorcontrib>RAGUSA, Roberto</creatorcontrib><creatorcontrib>ASARO, Alessandra</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CONTI, Chiara</au><au>FREDDI, Remo</au><au>RAGUSA, Roberto</au><au>ASARO, Alessandra</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CONTROL OF ACCESS TO COMPUTING RESOURCES IMPLEMENTED IN ISOLATED ENVIRONMENTS</title><date>2024-09-04</date><risdate>2024</risdate><abstract>A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated from the secondary computing environment) detects an indication of a positive result of the verification of the access request; in response thereto, the main computing environment verifies an integrity condition of the secondary computing environment and then authorizes the secondary computing environment to access the computing resources accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP4423645A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title CONTROL OF ACCESS TO COMPUTING RESOURCES IMPLEMENTED IN ISOLATED ENVIRONMENTS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-13T11%3A47%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CONTI,%20Chiara&rft.date=2024-09-04&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP4423645A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true