SYSTEM-LEVEL AUTHENTICATION CREDENTIALS TO PERFORM DATA CENTER OPERATIONS
An example method may include receiving a first authentication credential corresponding to a component in a data center. The first authentication credential may be provided by a user to access the component. Further, the method may include dynamically generating a second authentication credential co...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Kandachar Sridhara Rao, Sudarshana KOTTAPALLI, RAVI KUMAR REDDY |
description | An example method may include receiving a first authentication credential corresponding to a component in a data center. The first authentication credential may be provided by a user to access the component. Further, the method may include dynamically generating a second authentication credential corresponding to the first authentication credential. The second authentication credential may be system-generated to access the component. Furthermore, the method may include generating mapping information for mapping the second authentication credential to the first authentication credential. In response to receiving a first request to perform a data center operation that is dependent on the component, the method may include utilizing the first authentication credential to authenticate the first request and utilizing the second authentication credential to perform the data center operation using the mapping information. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2024236071A9</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2024236071A9</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2024236071A93</originalsourceid><addsrcrecordid>eNrjZPAMjgwOcfXV9XENc_VRcAwN8XD1C_F0dgzx9PdTcA5ydQFxHX2CFUL8FQJcg9z8g3wVXBxDHBWcgRKuQQr-QEGw4mAeBta0xJziVF4ozc2g7OYa4uyhm1qQH59aXJCYnJqXWhIfGmxkYGRiZGxmYG7oaGlMnCoAIjkufw</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEM-LEVEL AUTHENTICATION CREDENTIALS TO PERFORM DATA CENTER OPERATIONS</title><source>esp@cenet</source><creator>Kandachar Sridhara Rao, Sudarshana ; KOTTAPALLI, RAVI KUMAR REDDY</creator><creatorcontrib>Kandachar Sridhara Rao, Sudarshana ; KOTTAPALLI, RAVI KUMAR REDDY</creatorcontrib><description>An example method may include receiving a first authentication credential corresponding to a component in a data center. The first authentication credential may be provided by a user to access the component. Further, the method may include dynamically generating a second authentication credential corresponding to the first authentication credential. The second authentication credential may be system-generated to access the component. Furthermore, the method may include generating mapping information for mapping the second authentication credential to the first authentication credential. In response to receiving a first request to perform a data center operation that is dependent on the component, the method may include utilizing the first authentication credential to authenticate the first request and utilizing the second authentication credential to perform the data center operation using the mapping information.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240711&DB=EPODOC&CC=US&NR=2024236071A9$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240711&DB=EPODOC&CC=US&NR=2024236071A9$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Kandachar Sridhara Rao, Sudarshana</creatorcontrib><creatorcontrib>KOTTAPALLI, RAVI KUMAR REDDY</creatorcontrib><title>SYSTEM-LEVEL AUTHENTICATION CREDENTIALS TO PERFORM DATA CENTER OPERATIONS</title><description>An example method may include receiving a first authentication credential corresponding to a component in a data center. The first authentication credential may be provided by a user to access the component. Further, the method may include dynamically generating a second authentication credential corresponding to the first authentication credential. The second authentication credential may be system-generated to access the component. Furthermore, the method may include generating mapping information for mapping the second authentication credential to the first authentication credential. In response to receiving a first request to perform a data center operation that is dependent on the component, the method may include utilizing the first authentication credential to authenticate the first request and utilizing the second authentication credential to perform the data center operation using the mapping information.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPAMjgwOcfXV9XENc_VRcAwN8XD1C_F0dgzx9PdTcA5ydQFxHX2CFUL8FQJcg9z8g3wVXBxDHBWcgRKuQQr-QEGw4mAeBta0xJziVF4ozc2g7OYa4uyhm1qQH59aXJCYnJqXWhIfGmxkYGRiZGxmYG7oaGlMnCoAIjkufw</recordid><startdate>20240711</startdate><enddate>20240711</enddate><creator>Kandachar Sridhara Rao, Sudarshana</creator><creator>KOTTAPALLI, RAVI KUMAR REDDY</creator><scope>EVB</scope></search><sort><creationdate>20240711</creationdate><title>SYSTEM-LEVEL AUTHENTICATION CREDENTIALS TO PERFORM DATA CENTER OPERATIONS</title><author>Kandachar Sridhara Rao, Sudarshana ; KOTTAPALLI, RAVI KUMAR REDDY</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2024236071A93</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Kandachar Sridhara Rao, Sudarshana</creatorcontrib><creatorcontrib>KOTTAPALLI, RAVI KUMAR REDDY</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kandachar Sridhara Rao, Sudarshana</au><au>KOTTAPALLI, RAVI KUMAR REDDY</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEM-LEVEL AUTHENTICATION CREDENTIALS TO PERFORM DATA CENTER OPERATIONS</title><date>2024-07-11</date><risdate>2024</risdate><abstract>An example method may include receiving a first authentication credential corresponding to a component in a data center. The first authentication credential may be provided by a user to access the component. Further, the method may include dynamically generating a second authentication credential corresponding to the first authentication credential. The second authentication credential may be system-generated to access the component. Furthermore, the method may include generating mapping information for mapping the second authentication credential to the first authentication credential. In response to receiving a first request to perform a data center operation that is dependent on the component, the method may include utilizing the first authentication credential to authenticate the first request and utilizing the second authentication credential to perform the data center operation using the mapping information.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2024236071A9 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | SYSTEM-LEVEL AUTHENTICATION CREDENTIALS TO PERFORM DATA CENTER OPERATIONS |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T12%3A57%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Kandachar%20Sridhara%20Rao,%20Sudarshana&rft.date=2024-07-11&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2024236071A9%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |