Information security – Access control or authentication – Network
Reexamination Certificate
2011-03-22
2011-03-22
Srivastava, Vivek (Department: 2433)
Information security
Access control or authentication
Network
C726S002000, C726S017000, C726S021000, C726S027000, C726S028000, C726S029000, C726S030000, C711S161000, C709S202000, C709S224000
Reexamination Certificate
active
07913300
ABSTRACT:
Centralized role-based access control (RBAC) for storage servers can include operating multiple storage servers, each configured to provide a set of clients with access to stored data, and using a separate network server to provide centralized RBAC. The network server may include an API proxy to proxy requests to access individual APIs of a storage server by an application which is external to the network server and the storage server and may control access to the individual APIs of the storage servers on a per-API, per-user and per-object basis. The API proxy may filter responses to API calls based on the access privileges of the user of the application which sent the API call. In some embodiments, the network server may implement a Windows domain server, an LDAP server or the like to evaluate security credentials of administrative users on behalf of multiple storage servers.
REFERENCES:
patent: 7092942 (2006-08-01), Frieden et al.
patent: 7185359 (2007-02-01), Schmidt et al.
patent: 7234032 (2007-06-01), Durham et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2003/0208378 (2003-11-01), Thangaraj et al.
patent: 2003/0225889 (2003-12-01), Moutafov
patent: 2004/0083367 (2004-04-01), Garg et al.
patent: 2005/0172151 (2005-08-01), Kodimer et al.
patent: 2005/0229236 (2005-10-01), Devgan et al.
patent: 2005/0251522 (2005-11-01), Clark
patent: 2006/0230281 (2006-10-01), Hofmann
Decru, “Securing Networked Storage”, white paper, 2003, http://www.source.be/partners/whitePapers/DECRU/Decru—DataFortWP.pdf; pp. 1-10.
Weizhong Qiang et. al., “RB-GACA: A RBAC Based Grid Access Control Architecture”, Lecture Notes in Computer Science (LNCS vol. 3032), pp. 487-494, 2004. Springer-Verlag Berlin Heidelberg.
E. Damiani et. al., “Securing SOAP e-services”, IJIS (2002), vol. 1: pp. 100-115, Springer Berlin Heidelberg.
Joon S. Park, et al., “Role-Based Access Control on the Web”, ACM Transactions on Information and System Security (ITSSEC), vol. 4, Issue 1, pp. 37-71, 2001.
Wwizhong Qiang et. al., “RB-GACA A RBAC Based Grid Access Control Architecture”, Lecture Notes in Computer Science (LNCS vol. 3032), pp. 487-494, 2004. Springer-Verlag Berlin Heidelberg.
Yi-Jung Lin, “Role-Based and Adaptive User Interface Designs in A Teledermatology Consult System: A Way to Secure and a Way to Enhance”, AMIA 2003 Symposium Proceedings—p. 913.
“Converting 4.4 modules to 4.5”, pp. 1-10, downloaded from http://drupal.org
ode/7176 on Mar. 21, 2005.
“AlterPath BladeManager: Console Management and A Security Gateway for IBM BladeCenter”, 2004, pp. 1-6, Cyclades Corporation, downloaded from http://www.cyclades.com/resources/index.php?an=27 on Mar. 21, 2005.
Tobin Sears, “DataFabric Manager, Distributing Data with DFM”, Jan. 2004, pp. 1-17, Network Appliance, Inc., Sunnyvale, California.
“Enterprise Portal 2.5 Developer's Guide, Chapter 6, Introduction”, pp. 1-10, downloaded from http://manuals.sybase.com/onlinebooks/group-ep/epg0250e/devgd/@Generic—BookText... On Mar. 21, 2005.
Jeremy Blosser, “Explore the Dynamic Proxy API”, Nov. 2000, pp. 1-9, JavaWorld.com, downloaded from http://www.javaworld.com/javaworld/jw-11-2000/jw-1110-proxy.html on Feb. 7, 2005.
“OpenCIRCA functions-EIONET, European Environment Information and Observation Network (EIONET), Networking improving Europe's environment, OpenCIRCA, Technical Characteristics”, Nov. 11, 2002, pp. 1-5, Release 1.0, downloaded from http://www.eionet.eu.int/EIONET—Tech/CIRCA/opencircafunctions on Mar. 21, 2005.
“RMI Proxy API: Class ProxyNaming”, 2003, pp. 1-7, Telekinesis Pty Ltd, Australia, downloaded from http://www.rmiproxy.com/doc/apidoc/com/rmiproxy/ProxyNaming.html on Feb. 7, 2005.
Flank Joshua H.
Klinkner Steven R.
Swartzlander Benjamin B.
Thompson Timothy J.
Yoder Alan G.
NetApp, Inc.
Perkins Coie LLP
Song Hee
Srivastava Vivek
LandOfFree
Centralized role-based access control for storage servers does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Centralized role-based access control for storage servers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Centralized role-based access control for storage servers will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2731657