Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2011-01-18
2011-01-18
Cervetti, David Garcia (Department: 2436)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S021000, C726S001000
Reexamination Certificate
active
07874008
ABSTRACT:
Methods and systems are provided for dynamically altering the capabilities of a software application in response to a request from a user to perform an action in the application. Based on the user's security role, the software application is reconfigured by either granting access to the user to an existing component of the application, or if no suitable component is available, adding an external vendor component to the software application which is suitable for performing the requested action.
REFERENCES:
patent: 6105063 (2000-08-01), Hayes, Jr.
patent: 6606711 (2003-08-01), Hill et al.
patent: 7130885 (2006-10-01), Chandra et al.
patent: 7454786 (2008-11-01), Chang et al.
patent: 7546640 (2009-06-01), Chang et al.
patent: 7620885 (2009-11-01), Moulckers et al.
patent: 2001/0011341 (2001-08-01), Hayes, Jr. et al.
patent: 2005/0021383 (2005-01-01), Fliess et al.
patent: 2005/0102536 (2005-05-01), Patrick et al.
patent: 2005/0172149 (2005-08-01), Xu et al.
patent: 2008/0263543 (2008-10-01), Ramachandran
U.S. Appl. No. 11/351,035, Chang et al.
“Using Java Security to Protect WebLogic Resources” http://d-docs.bea.com/wls/docs90/security/server—prot.html, accessed Aug. 29, 2005.
“Securing WebLogic Resources” http://e-docs.bea.com/wls/docs81/secwires/secroles.html, accessed Aug. 29, 2005.
“Context-Aware Dynamic Access Control for Pervasive Applications”, Zhang et al., http:www.caip.rutgers.edu/TASSL/Papers/automate-sesame-cnds-04.pdf, 2004.
“Universal IdP™: Universal Identity Manager (IM),” Open Network, cache of http://www.opennetwork.com/solutions/functionality/im/, accessed Aug. 29, 2005.
Bhatti et al., “XML-Based Specification for Web Services Document Security,” IEEE, pp. 41-49, Apr. 2004, http://web.ics.purdue.edu/˜bhattir/academics/research/papers/IEEE—Computer—APR04.pdf.
Fernandez, “Enterprise Dynamic Access Control (EDAC): Overview,” Prepared for Commander, US Pacific Fleet, Pearl Harbor, May 1, 2005.
Himanshu Khurana, “Integrated Security Services for Dynamic Coalition Management,” Electrical and Computer Engineering Dept., Univ. of Maryland, DARPA DC PI Meeting, Jul. 25, 2003, http//www.ece.umd.edu/˜gligor/ISSDCM2003/DARPA—DC—PI—Meeting—07—2003.pdf.
“Role and Rule-Based Provisioning,” Beta Systems Software AG, 2003-2005, http://www2.betasystems.com/en/portfolio/products—solutions/securitymanagement/sam/ht—rolebased—prov.html.
Chang David Yu
Chang John Yow-Chung
Venkataramappa Vishwanath
Cervetti David Garcia
International Business Machines - Corporation
The Brevetto Law Group
LandOfFree
Dynamically configuring extensible role based manageable... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Dynamically configuring extensible role based manageable..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Dynamically configuring extensible role based manageable... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2719732