Information security – Access control or authentication
Reexamination Certificate
2007-12-11
2007-12-11
Barron, Jr., Gilberto (Department: 2132)
Information security
Access control or authentication
C726S001000
Reexamination Certificate
active
10642499
ABSTRACT:
Data structures for use in controlling access to data objects by users of a computer system or computing device are described. The data structures include an access control group data structure, a user access data structure, and a data object access data structure. The access control group data structure stores access control group data. The user access data structure stores user access data. The user access data relates to at least one entry in the access control group data structure. The data object access data structure stores data object access data, which relates to at least one entry in the access control group. Additional data structures described include an access control rule data structure and a characteristic method data structure.
REFERENCES:
patent: 5539906 (1996-07-01), Abraham et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6088679 (2000-07-01), Barkley
patent: 6470339 (2002-10-01), Karp et al.
patent: 6470353 (2002-10-01), Yaung et al.
patent: 6484258 (2002-11-01), Haverty
patent: 6513039 (2003-01-01), Kraenzel
patent: 6535879 (2003-03-01), Behera
patent: 6539380 (2003-03-01), Moran
patent: 6578037 (2003-06-01), Wong et al.
patent: 6591265 (2003-07-01), Erickson et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0178119 (2002-11-01), Griffin et al.
patent: 2002/0184535 (2002-12-01), Laracuente et al.
patent: 0697662 (1996-02-01), None
patent: 0913966 (1999-05-01), None
patent: 0 992 873 (2000-04-01), None
Wikipedia on line Encyclopedia; URL: http://en.wikipedia.org/wiki/Relational—model (pp. 11 and 12) and http://en.wikipedia.org/wiki/Relational—database—management—system (p. 5).
Barkley, et al. “Managing Role/Permission Relationships Using Object Access Types,”Proceedings of the 3rdACM Workshop on Role-Based Access Control, New York, US, Oct. 22-23, 1998, pp. 73-80.
Deng, et al., “A Dynamic Access Control Model for Object-Oriented System,”Institute of Electrical and Electronics Engineers, New York, US, Oct. 13-15, 1993, pp. 159-163.
Schaad, et al. “The Role-Based Access Control System of a European Bank: A Case Study and Discussion,”Proceedings of The 6thACM Symposium on Access Control Models and Technologies, Chantilly, VA, May 3-4, 2001, pp. 3-9.
Sandhu, et al. “Access Control: Principles and Practice,”IEEE Communications Magazine, Sep. 1, 1994, vol. 32, No. 9, pp. 40-48.
“XACML: A New Standard Protects Content in Data Exchange,” Jun. 24, 2003, 7 pages, reprinted from http://developer.java.sun.com/developer/technicalArticles/Security/xacml/xacml.html.
“Sun's XACML Implementation,” Jun. 23, 2003 Update, 2 pages, reprinted from http://sunxacml.sourceforge.net.
“OASIS: XACML Implementers Guide,” Hal Lockhart, ed., Jun. 12, 2002, 5 pages.
“OASIS: Web-Services Policy Language Use-Cases and Requirements, Working Draft 04,” Tim Moses, ed., Apr. 16, 2003, 23 pages.
“OASIS: eXtensible Access Control Markup Language (XACML) Version 1.0, OASIS Standard,” Simon Godik and Tim Moses, eds., Feb. 18, 2003, 132 pages.
Drittler Bernhard
Kupke Markus
Vogel Matthias
Barron Jr. Gilberto
Fish & Richardson P.C.
Homayounmehr Farid
Sap AG
LandOfFree
Data structure for access control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data structure for access control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data structure for access control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3831752