Centralized role-based access control for storage servers

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S017000, C726S021000, C726S027000, C726S028000, C726S029000, C726S030000, C711S161000, C709S202000, C709S224000

Reexamination Certificate

active

07913300

ABSTRACT:
Centralized role-based access control (RBAC) for storage servers can include operating multiple storage servers, each configured to provide a set of clients with access to stored data, and using a separate network server to provide centralized RBAC. The network server may include an API proxy to proxy requests to access individual APIs of a storage server by an application which is external to the network server and the storage server and may control access to the individual APIs of the storage servers on a per-API, per-user and per-object basis. The API proxy may filter responses to API calls based on the access privileges of the user of the application which sent the API call. In some embodiments, the network server may implement a Windows domain server, an LDAP server or the like to evaluate security credentials of administrative users on behalf of multiple storage servers.

REFERENCES:
patent: 7092942 (2006-08-01), Frieden et al.
patent: 7185359 (2007-02-01), Schmidt et al.
patent: 7234032 (2007-06-01), Durham et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2003/0208378 (2003-11-01), Thangaraj et al.
patent: 2003/0225889 (2003-12-01), Moutafov
patent: 2004/0083367 (2004-04-01), Garg et al.
patent: 2005/0172151 (2005-08-01), Kodimer et al.
patent: 2005/0229236 (2005-10-01), Devgan et al.
patent: 2005/0251522 (2005-11-01), Clark
patent: 2006/0230281 (2006-10-01), Hofmann
Decru, “Securing Networked Storage”, white paper, 2003, http://www.source.be/partners/whitePapers/DECRU/Decru—DataFortWP.pdf; pp. 1-10.
Weizhong Qiang et. al., “RB-GACA: A RBAC Based Grid Access Control Architecture”, Lecture Notes in Computer Science (LNCS vol. 3032), pp. 487-494, 2004. Springer-Verlag Berlin Heidelberg.
E. Damiani et. al., “Securing SOAP e-services”, IJIS (2002), vol. 1: pp. 100-115, Springer Berlin Heidelberg.
Joon S. Park, et al., “Role-Based Access Control on the Web”, ACM Transactions on Information and System Security (ITSSEC), vol. 4, Issue 1, pp. 37-71, 2001.
Wwizhong Qiang et. al., “RB-GACA A RBAC Based Grid Access Control Architecture”, Lecture Notes in Computer Science (LNCS vol. 3032), pp. 487-494, 2004. Springer-Verlag Berlin Heidelberg.
Yi-Jung Lin, “Role-Based and Adaptive User Interface Designs in A Teledermatology Consult System: A Way to Secure and a Way to Enhance”, AMIA 2003 Symposium Proceedings—p. 913.
“Converting 4.4 modules to 4.5”, pp. 1-10, downloaded from http://drupal.org
ode/7176 on Mar. 21, 2005.
“AlterPath BladeManager: Console Management and A Security Gateway for IBM BladeCenter”, 2004, pp. 1-6, Cyclades Corporation, downloaded from http://www.cyclades.com/resources/index.php?an=27 on Mar. 21, 2005.
Tobin Sears, “DataFabric Manager, Distributing Data with DFM”, Jan. 2004, pp. 1-17, Network Appliance, Inc., Sunnyvale, California.
“Enterprise Portal 2.5 Developer's Guide, Chapter 6, Introduction”, pp. 1-10, downloaded from http://manuals.sybase.com/onlinebooks/group-ep/epg0250e/devgd/@Generic—BookText... On Mar. 21, 2005.
Jeremy Blosser, “Explore the Dynamic Proxy API”, Nov. 2000, pp. 1-9, JavaWorld.com, downloaded from http://www.javaworld.com/javaworld/jw-11-2000/jw-1110-proxy.html on Feb. 7, 2005.
“OpenCIRCA functions-EIONET, European Environment Information and Observation Network (EIONET), Networking improving Europe's environment, OpenCIRCA, Technical Characteristics”, Nov. 11, 2002, pp. 1-5, Release 1.0, downloaded from http://www.eionet.eu.int/EIONET—Tech/CIRCA/opencircafunctions on Mar. 21, 2005.
“RMI Proxy API: Class ProxyNaming”, 2003, pp. 1-7, Telekinesis Pty Ltd, Australia, downloaded from http://www.rmiproxy.com/doc/apidoc/com/rmiproxy/ProxyNaming.html on Feb. 7, 2005.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Centralized role-based access control for storage servers does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Centralized role-based access control for storage servers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Centralized role-based access control for storage servers will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2731657

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.