Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2000-07-03
2004-06-29
Pardo, Thuy N. (Department: 2175)
Data processing: database and file management or data structures
Database design
Data structure types
C707S793000, C707S793000, C707S793000, C707S793000
Reexamination Certificate
active
06757680
ABSTRACT:
FIELD OF THE INVENTION
The present invention relates to methods and systems for establishing access control rules in managing access to information items stored in a relational database management system (RDBMS).
BACKGROUND OF THE INVENTION
As set forth in related co-pending U.S. patent application Ser. No. (docket AM9-99-0210), information management systems (IMS) typically use a relational database management system (RDBMS) to manage data records. As an example, an IMS might manage document data, with the desire that some documents can be read by many users but only written to by a few. Many other high-level access rules can be enforced by the IMS. In any case, when a user wants to access the records of a document in the RDBMS, the user is routed through the IMS to first check for access control.
The documents themselves are broken down into records by the IMS and the records are stored in tabular form in the RDBMS, which can efficiently manage the records for querying using a language known as SQL. Only the IMS knows the high level access control rules with the high level rules being broken down by the IMS into low level rules for the RDBMS to enforce. An example of a low level rule is which users can perform which SQL operations against which data tables. Since the high level access control rules are for an entire document, low level access control rules are enforced table by table in the RDBMS, and are not enforced at any finer granularity (e.g., row by row). In any case, user applications must access the RDBMS indirectly, through the IMS, to ensure integrity and protection of data. The above-referenced application discloses an invention that essentially uses table view definitions in a novel way to enable users to access RDBMS directly without requiring modifications to the RDBMS, thereby enhancing performance, while at the same time maintaining high-level access control.
Of relevance to the present invention is ensuring effective access control for information items, with ease of administration and efficient access control checking. As recognized herein, access control rules for an item such as a document can be established simply by conceptually placing the item in a container, such as a folder, without requiring the editing of the items's control rules, an otherwise tedious and risky operation for many users. This is accomplished by allowing items placed in a folder to inherit access control rules from the folder. The folder's access control rules can be carefully defined by an administrator or security officer. When a folder is allowed to contain other folders (since folders themselves are also information items), the inheritance can propagate from one container to another. Unlike the case of a file in a directory of a file system, however, in which a single access path is normally provided to a file such that each directory in the path can restrict access to lower levels, the present invention recognizes that an item in a RDBMS can have multiple access paths, each of which may be controlled by separate protection rules, consequently requiring the novel invention provided herein.
SUMMARY OF THE INVENTION
The invention is a general purpose computer programmed according to the inventive steps herein. The invention can also be embodied as an article of manufacture—a machine component—that is used by a digital processing apparatus and which tangibly embodies a program of instructions that are executable by the digital processing apparatus to undertake the present invention. This invention is realized in a critical machine component that causes a digital processing apparatus to perform the inventive method steps herein. The invention is also a computer-implemented method for undertaking the acts disclosed below.
Accordingly, a computer is programmed with instructions to selectively apply at least one container access control rule that is associated with a primary container to at least one item associated with both the primary container and with another container. The instructions embody method acts that include selecting whether to activate inheritance of the container access control rule, and then applying the container access control to the item only when inheritance is activated.
In a preferred embodiment, the method acts embodied by the instructions further include designating a container as the primary container for an item. Also, the method acts embodied by the instructions can include applying at least one item access control rule to the item, when inheritance is not activated. In a particularly preferred embodiment, the method acts embodied by the instructions include propagating the container access control rules through plural levels of containers.
In another aspect, a computer program product includes computer usable code means that are programmed with logic for establishing access control rules for an item in an information management system (IMS) for an application directly communicating with a relational database management system (RDBMS) associated with the IMS. The program product includes computer readable code means for selecting a primary container for the item. Also, computer readable code means activate inheritance of access control from container to item, while computer readable code means are provided for applying container access control rules to the item when the application seeks to access the item.
In still another aspect, a computer-implemented method includes inserting at least one data item associated with item access control rules into at least one data container associated with container access control rules. Access control rules to apply to the item are then selected, and one of: the item access control rules, and the container access control rules, are applied to the item based on the selecting act.
REFERENCES:
patent: 5483596 (1996-01-01), Rosenow et al.
patent: 5511186 (1996-04-01), Carhart et al.
patent: 5553218 (1996-09-01), Li et al.
patent: 5615112 (1997-03-01), Liu Sheng et al.
patent: 5630127 (1997-05-01), Moore et al.
patent: 5644770 (1997-07-01), Burke et al.
patent: 5734899 (1998-03-01), Yoshizawa et al.
patent: 5745896 (1998-04-01), Vijaykumar
patent: 5787428 (1998-07-01), Hart
patent: 5809317 (1998-09-01), Kogan et al.
patent: 5826268 (1998-10-01), Schaefer et al.
patent: 5937402 (1999-08-01), Pandit
patent: 5978811 (1999-11-01), Smiley
patent: 5991776 (1999-11-01), Bennett et al.
patent: 6012067 (2000-01-01), Sakar
patent: 6029160 (2000-02-01), Cabrera et al.
patent: 6038563 (2000-03-01), Bapat et al.
patent: 6067542 (2000-05-01), Carino, Jr.
patent: 6085031 (2000-07-01), Johnson et al.
patent: 6085191 (2000-07-01), Fisher et al.
patent: 6088694 (2000-07-01), Burns et al.
patent: 6112209 (2000-08-01), Gusack
patent: 6144959 (2000-11-01), Anderson et al.
patent: 6151623 (2000-11-01), Harrison et al.
patent: 6154741 (2000-11-01), Feldman
patent: 6192405 (2001-02-01), Bunnell
patent: 6249873 (2001-06-01), Richard et al.
patent: 6275824 (2001-08-01), O'Flaherty et al.
patent: 6308173 (2001-10-01), Glasser et al.
patent: 6345288 (2002-02-01), Reed et al.
patent: 6385730 (2002-05-01), Garrison
patent: 6473748 (2002-10-01), Archer
patent: 6578037 (2003-06-01), Wong et al.
patent: 6631371 (2003-10-01), Lei et al.
Deng, “Fast Control in Object-Oriented Repetitive Access,” IEEE, 1994, pp. 173-175.
International Business Machines - Corporation
Pardo Thuy N.
Rogitz John L.
LandOfFree
System and method for inheriting access control rules does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for inheriting access control rules, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for inheriting access control rules will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3345166