CPC H04L 63/102 (2013.01) [G06Q 30/016 (2013.01)] | 16 Claims |
1. A computer implemented method for granting access to secure resources, the method comprising:
receiving at a computer system from a secondary computing device, a ticket providing access parameters for a secure resource, the ticket including a first identifier generated by the secondary computing device based on a request from an owner of the secure resource;
receiving an access request for the secure resource from a verified user, the access request including the first identifier;
confirming that the access request complies with the access parameters provided by the ticket;
generating an access token, the access token usable by the verified user for accessing the secure resource;
receiving a request from the verified user to grant access to a second verified user;
confirming that the request from the verified user complies with the access parameters; and
providing a second access token usable by the second verified user for accessing the secure resource.
|