Controlling use of computing-related resources by multiple...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S015000, C726S016000, C726S017000, C726S018000, C726S019000, C726S020000, C726S021000, C726S022000, C726S023000, C726S024000, C726S025000, C726S026000, C726S027000, C726S028000, C726S029000, C707S609000, C709S225000, C709S229000

Reexamination Certificate

active

08051491

ABSTRACT:
Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such that a request to access a resource succeeds only if all of multiple associated parties approve that access). For example, an executing software application may, on behalf of an end user, make use of computing-related resources of one or more types that are provided by one or more remote third-party network services (e.g., data storage services provided by an online storage service)—in such a situation, both the developer user who created the software application and the end user may be allowed to independently specify access rights for one or more particular such computing-related resources (e.g., stored data files), such that neither the end user nor the software application developer user may later access those resources without the approval of the other party.

REFERENCES:
patent: 7296235 (2007-11-01), Bhat et al.
patent: 7478419 (2009-01-01), Anderson et al.
patent: 2006/0191017 (2006-08-01), Hieda
“Amazon DevPay—Limited Beta,” retrieved on Dec. 20, 2007, from http://www.amazon.com/b/ref=sc—fe—c—1—3435361—1?ie=UTF8&node=342429011&no=343536..., 6 pages.
“Welcome to Amazon Web Services,” retrieved on Dec. 20, 2007, from http://www.amazon.com/gp/browse.html?node=3435361, 3 pages.
Mandatory Access Control, http://en.wikipedia.org/wiki/Mandatory—access—control, 4 pages, downloaded Nov. 15, 2007.
Discretionary access control, http://en.wikipedia.org/wiki/Discretionary—access—control, 2 pages, downloaded Nov. 15, 2007.
Role-based access control, http://en.wikipedia.org/wiki/Role-Based—Access—Control, 3 pages, downloaded Nov. 15, 2007.
SecPAL, https://research.microsoft.com/projects/SecPAL, 2 pages, downloaded Oct. 11, 2007.
Becker, Moritz Y. et al., “Design and Semantics of a Decentralized Authorization Language,” CSF '07. 20th IEEE, Jul. 6-8, 2007, 13 pages (+ 1 page Abstract).
Dillaway, Blair, “A Unified Approach to Trust, Delegation, and Authorization in Large-Scale Grids,” Sep. 2006, 24 pages.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Controlling use of computing-related resources by multiple... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Controlling use of computing-related resources by multiple..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling use of computing-related resources by multiple... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4299290

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.