Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2007-12-28
2011-11-01
Arani, Taghi (Department: 2438)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S015000, C726S016000, C726S017000, C726S018000, C726S019000, C726S020000, C726S021000, C726S022000, C726S023000, C726S024000, C726S025000, C726S026000, C726S027000, C726S028000, C726S029000, C707S609000, C709S225000, C709S229000
Reexamination Certificate
active
08051491
ABSTRACT:
Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such that a request to access a resource succeeds only if all of multiple associated parties approve that access). For example, an executing software application may, on behalf of an end user, make use of computing-related resources of one or more types that are provided by one or more remote third-party network services (e.g., data storage services provided by an online storage service)—in such a situation, both the developer user who created the software application and the end user may be allowed to independently specify access rights for one or more particular such computing-related resources (e.g., stored data files), such that neither the end user nor the software application developer user may later access those resources without the approval of the other party.
REFERENCES:
patent: 7296235 (2007-11-01), Bhat et al.
patent: 7478419 (2009-01-01), Anderson et al.
patent: 2006/0191017 (2006-08-01), Hieda
“Amazon DevPay—Limited Beta,” retrieved on Dec. 20, 2007, from http://www.amazon.com/b/ref=sc—fe—c—1—3435361—1?ie=UTF8&node=342429011&no=343536..., 6 pages.
“Welcome to Amazon Web Services,” retrieved on Dec. 20, 2007, from http://www.amazon.com/gp/browse.html?node=3435361, 3 pages.
Mandatory Access Control, http://en.wikipedia.org/wiki/Mandatory—access—control, 4 pages, downloaded Nov. 15, 2007.
Discretionary access control, http://en.wikipedia.org/wiki/Discretionary—access—control, 2 pages, downloaded Nov. 15, 2007.
Role-based access control, http://en.wikipedia.org/wiki/Role-Based—Access—Control, 3 pages, downloaded Nov. 15, 2007.
SecPAL, https://research.microsoft.com/projects/SecPAL, 2 pages, downloaded Oct. 11, 2007.
Becker, Moritz Y. et al., “Design and Semantics of a Decentralized Authorization Language,” CSF '07. 20th IEEE, Jul. 6-8, 2007, 13 pages (+ 1 page Abstract).
Dillaway, Blair, “A Unified Approach to Trust, Delegation, and Authorization in Large-Scale Grids,” Sep. 2006, 24 pages.
Cavage Mark Joseph
Cormie John
Fitch Nathan R.
Johnson Don
Sirota Peter
Amazon Technologies Inc.
Arani Taghi
Seed IP Law Group PLLC
Victoria Narciso
LandOfFree
Controlling use of computing-related resources by multiple... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Controlling use of computing-related resources by multiple..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Controlling use of computing-related resources by multiple... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4299290