Dynamically configuring extensible role based manageable...

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S021000, C726S001000

Reexamination Certificate

active

07874008

ABSTRACT:
Methods and systems are provided for dynamically altering the capabilities of a software application in response to a request from a user to perform an action in the application. Based on the user's security role, the software application is reconfigured by either granting access to the user to an existing component of the application, or if no suitable component is available, adding an external vendor component to the software application which is suitable for performing the requested action.

REFERENCES:
patent: 6105063 (2000-08-01), Hayes, Jr.
patent: 6606711 (2003-08-01), Hill et al.
patent: 7130885 (2006-10-01), Chandra et al.
patent: 7454786 (2008-11-01), Chang et al.
patent: 7546640 (2009-06-01), Chang et al.
patent: 7620885 (2009-11-01), Moulckers et al.
patent: 2001/0011341 (2001-08-01), Hayes, Jr. et al.
patent: 2005/0021383 (2005-01-01), Fliess et al.
patent: 2005/0102536 (2005-05-01), Patrick et al.
patent: 2005/0172149 (2005-08-01), Xu et al.
patent: 2008/0263543 (2008-10-01), Ramachandran
U.S. Appl. No. 11/351,035, Chang et al.
“Using Java Security to Protect WebLogic Resources” http://d-docs.bea.com/wls/docs90/security/server—prot.html, accessed Aug. 29, 2005.
“Securing WebLogic Resources” http://e-docs.bea.com/wls/docs81/secwires/secroles.html, accessed Aug. 29, 2005.
“Context-Aware Dynamic Access Control for Pervasive Applications”, Zhang et al., http:www.caip.rutgers.edu/TASSL/Papers/automate-sesame-cnds-04.pdf, 2004.
“Universal IdP™: Universal Identity Manager (IM),” Open Network, cache of http://www.opennetwork.com/solutions/functionality/im/, accessed Aug. 29, 2005.
Bhatti et al., “XML-Based Specification for Web Services Document Security,” IEEE, pp. 41-49, Apr. 2004, http://web.ics.purdue.edu/˜bhattir/academics/research/papers/IEEE—Computer—APR04.pdf.
Fernandez, “Enterprise Dynamic Access Control (EDAC): Overview,” Prepared for Commander, US Pacific Fleet, Pearl Harbor, May 1, 2005.
Himanshu Khurana, “Integrated Security Services for Dynamic Coalition Management,” Electrical and Computer Engineering Dept., Univ. of Maryland, DARPA DC PI Meeting, Jul. 25, 2003, http//www.ece.umd.edu/˜gligor/ISSDCM2003/DARPA—DC—PI—Meeting—07—2003.pdf.
“Role and Rule-Based Provisioning,” Beta Systems Software AG, 2003-2005, http://www2.betasystems.com/en/portfolio/products—solutions/securitymanagement/sam/ht—rolebased—prov.html.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Dynamically configuring extensible role based manageable... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Dynamically configuring extensible role based manageable..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Dynamically configuring extensible role based manageable... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2719732

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.