CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM

Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted fun...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Wong, Mang Fu Matthew
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Wong, Mang Fu Matthew
description Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted function. The multi-tenant computer system may further store first and second tenant-specific definitions for the restricted function that specify different secondary verification procedures. In various embodiments, the disclosed systems and methods may facilitate verifying access to the restricted function in the multi-tenant computer system. For example, in some embodiments, the multi-tenant computer system may perform an initial verification procedure and cause initiation of a secondary verification procedure specified by the first tenant in response to an attempt by a user of the first tenant to access the restricted function.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019068572A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019068572A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019068572A13</originalsourceid><addsrcrecordid>eNrjZLBxDg0O8ff1jHJ08nFVCHZ19vdzcQyKVAhzDfJ083R2DPH091Pw9FNwVPAN9Qnx1A1x9XP0C1EIjgwOcfXlYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBoaWBmYWpuZGjobGxKkCANjKKuM</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM</title><source>esp@cenet</source><creator>Wong, Mang Fu Matthew</creator><creatorcontrib>Wong, Mang Fu Matthew</creatorcontrib><description>Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted function. The multi-tenant computer system may further store first and second tenant-specific definitions for the restricted function that specify different secondary verification procedures. In various embodiments, the disclosed systems and methods may facilitate verifying access to the restricted function in the multi-tenant computer system. For example, in some embodiments, the multi-tenant computer system may perform an initial verification procedure and cause initiation of a secondary verification procedure specified by the first tenant in response to an attempt by a user of the first tenant to access the restricted function.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190228&amp;DB=EPODOC&amp;CC=US&amp;NR=2019068572A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190228&amp;DB=EPODOC&amp;CC=US&amp;NR=2019068572A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Wong, Mang Fu Matthew</creatorcontrib><title>CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM</title><description>Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted function. The multi-tenant computer system may further store first and second tenant-specific definitions for the restricted function that specify different secondary verification procedures. In various embodiments, the disclosed systems and methods may facilitate verifying access to the restricted function in the multi-tenant computer system. For example, in some embodiments, the multi-tenant computer system may perform an initial verification procedure and cause initiation of a secondary verification procedure specified by the first tenant in response to an attempt by a user of the first tenant to access the restricted function.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZLBxDg0O8ff1jHJ08nFVCHZ19vdzcQyKVAhzDfJ083R2DPH091Pw9FNwVPAN9Qnx1A1x9XP0C1EIjgwOcfXlYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBoaWBmYWpuZGjobGxKkCANjKKuM</recordid><startdate>20190228</startdate><enddate>20190228</enddate><creator>Wong, Mang Fu Matthew</creator><scope>EVB</scope></search><sort><creationdate>20190228</creationdate><title>CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM</title><author>Wong, Mang Fu Matthew</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019068572A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Wong, Mang Fu Matthew</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wong, Mang Fu Matthew</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM</title><date>2019-02-28</date><risdate>2019</risdate><abstract>Techniques are disclosed relating to verifying access to functions in a multi-tenant computer system. In various embodiments, a multi-tenant computer system may store code that is executable to perform a plurality of functions, where at least one of the plurality of functions may be a restricted function. The multi-tenant computer system may further store first and second tenant-specific definitions for the restricted function that specify different secondary verification procedures. In various embodiments, the disclosed systems and methods may facilitate verifying access to the restricted function in the multi-tenant computer system. For example, in some embodiments, the multi-tenant computer system may perform an initial verification procedure and cause initiation of a secondary verification procedure specified by the first tenant in response to an attempt by a user of the first tenant to access the restricted function.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2019068572A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title CUSTOMIZABLE SECONDARY VERIFICATION IN A MULTI-TENANT SYSTEM
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T02%3A58%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Wong,%20Mang%20Fu%20Matthew&rft.date=2019-02-28&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019068572A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true