Electrical computers and digital processing systems: support – System access control based on user identification by...
Reexamination Certificate
2007-03-13
2007-03-13
Jung, David (Department: 2134)
Electrical computers and digital processing systems: support
System access control based on user identification by...
C713S168000, C713S170000
Reexamination Certificate
active
09896200
ABSTRACT:
An apparatus and method for wildcarded security policy are implemented. These include associating wildcarded resource identifiers with a corresponding security policy. A resource identifier received in an access request is matched to one of a list of said wildcarded resource identifiers, Matching is determined in accordance with a predetermined set of precedence values, each precedence value of the set corresponding to a predetermined wildcard element.
REFERENCES:
patent: 5442780 (1995-08-01), Takanashi et al.
patent: 5892904 (1999-04-01), Atkinson et al.
patent: 6012094 (2000-01-01), Leymann et al.
patent: 6088801 (2000-07-01), Grecsek
patent: 6108676 (2000-08-01), Nakatsuyama
patent: 6138238 (2000-10-01), Scheifler et al.
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6170012 (2001-01-01), Coss et al.
Pinker and Wear, Operating Systems, Concepts, Policies, and Mechanisms, Prentice Hall, 1989, pp. 4, 205-207.
http://www.eli.sdsu.edu/courses/spring99/cs696
otes/rmilntro/rmilntro.html.
http://livedocs.macromedia.com/jrun/4/JRun—Service—Pack—1—Guide/jndisecurity4.htm.
http://www.eli.sdsu.edu/courses/spring99/cs696
otes/security/security.html.
Partial identification of Lorenz system and its application to key space reduction of chaotic cryptosystems; Solak, E.; Circuits and Systems II: Express Briefs, IEEE Transactions on; vol. 51, Issue 10, Oct. 2004 pp. 557-560.
Verifiable identifiers in middleware security; Lang, U.; Gollmann, D.; Schreiner, R.; Computer Security Applications Conference, 2001. ACSAC 2001. Proceedings 17th Annual Dec. 10-14, 2001 pp. 450-459.
Real-time interception systems for the GSM protocol; Gonzalez-Castano, et al.; Vehicular Technology, IEEE Transactions on vol. 51, Issue 5, Sep. 2002 pp. 904-914.
IBM Technical Disclosure Bulletin, (vol. 38, No. 09) Sep. 1995, “Partial Containment Structure for Inegration of Distributed Computing Environment and Local Registries,” pp. 535-538.
Glanzman Gerald H.
International Business Machines - Corporation
Jung David
LaBaw Jeffrey S.
Yee Duke W.
LandOfFree
Apparatus for wildcarded security policy and method therefor does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Apparatus for wildcarded security policy and method therefor, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Apparatus for wildcarded security policy and method therefor will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3775227