A method and system for providing a first network resource with secure but limited access to a second network resource. A method embodying the invention includes receiving from the first resource, digitally signed instructions to access the second resource. Data used to digitally sign the instructions is obtained, and, using the obtained data, it is verified that the instructions originated from an authorized source other than the first resource. Access to the second resource is granted only upon verifying that the instructions originated from an authorized source other than the first resource. Beneficially, the first resource cannot access the second without the user's knowledge or, at least, implicit consent.

 
Web www.patentalert.com

< Deep trench capacitor and method of making same

> Method and apparatus for enabling database privileges

> Container level access control mechanism

~ 00503