Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2003-12-10
2009-06-09
Cervetti, David G (Department: 2436)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S001000, C726S004000, C726S029000
Reexamination Certificate
active
07546640
ABSTRACT:
Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource. Further, the embodiment includes locating, based on the request, the resource in a structure having groupings of resources, wherein the groupings include a grouping having the resource. Typically the groupings comprise files having mappings of resources to assigned groups, and each group has an associated authorization table mapping roles or policies to users. Further still, the embodiment includes reading an authorization table associated with the grouping having the resource, and determining whether to grant the access rights for performing the action on the resource.
REFERENCES:
patent: 5787427 (1998-07-01), Benantar et al.
patent: 5903720 (1999-05-01), Stokes
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 5991877 (1999-11-01), Luckenbaugh
patent: 6023765 (2000-02-01), Kuhn
patent: 6044466 (2000-03-01), Anand et al.
patent: 6047377 (2000-04-01), Gong
patent: 6173404 (2001-01-01), Colburn et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6412070 (2002-06-01), Van Dyke et al.
patent: 6466932 (2002-10-01), Dennis et al.
patent: 6535884 (2003-03-01), Thornton et al.
patent: 6625603 (2003-09-01), Garg et al.
patent: 6772167 (2004-08-01), Snavely et al.
patent: 6917975 (2005-07-01), Griffin et al.
patent: 6928427 (2005-08-01), Rajasekaran et al.
patent: 6944777 (2005-09-01), Belani et al.
patent: 6950825 (2005-09-01), Chang et al.
patent: 6985955 (2006-01-01), Gullotta et al.
patent: 6993589 (2006-01-01), Blumenau et al.
patent: 7020653 (2006-03-01), Idicula et al.
patent: 7065783 (2006-06-01), Rygaard
patent: 7124192 (2006-10-01), High et al.
patent: 7131000 (2006-10-01), Bradee
patent: 7185015 (2007-02-01), Kester et al.
patent: 7197764 (2007-03-01), Cichowlas
patent: 7219234 (2007-05-01), Ashland et al.
patent: 7222369 (2007-05-01), Vering et al.
patent: 7260831 (2007-08-01), Beznosov et al.
patent: 7343628 (2008-03-01), Buchholz et al.
patent: 7373388 (2008-05-01), Leukert-Knapp et al.
patent: 7404203 (2008-07-01), Ng
patent: 2001/0056494 (2001-12-01), Trabelsi
patent: 2002/0083340 (2002-06-01), Eggebraaten et al.
patent: 2002/0095571 (2002-07-01), Bradee
patent: 2002/0143766 (2002-10-01), Rajasekaran et al.
patent: 2002/0156904 (2002-10-01), Gullotta et al.
patent: 2002/0178119 (2002-11-01), Griffin et al.
patent: 2003/0115228 (2003-06-01), Horvitz et al.
patent: 2003/0172161 (2003-09-01), Rymon
patent: 2003/0221012 (2003-11-01), Herrmann et al.
patent: 2004/0019799 (2004-01-01), Vering et al.
patent: 2004/0024875 (2004-02-01), Horvitz et al.
patent: 2004/0060002 (2004-03-01), Lucovsky et al.
patent: 2004/0139092 (2004-07-01), Jones et al.
patent: 2004/0162894 (2004-08-01), Griffin et al.
patent: 2004/0225893 (2004-11-01), Ng
patent: 2004/0225896 (2004-11-01), Ng
patent: 2004/0243822 (2004-12-01), Buchholz et al.
patent: 2005/0097352 (2005-05-01), Patrick et al.
patent: 2005/0251852 (2005-11-01), Patrick et al.
patent: 2008/0114769 (2008-05-01), Buchholz et al.
U.S. Patent Application entitled “Fine-Grained Authorization Using MBeans,” filed herewith, David Yu Chang, et al.
U.S. Patent Application entitled “Fine-Grained Authorization By Traversing Generational Relationships,” filed herewith, David Yu Chang, et al.
Longhua Zhang, et al., A Rule-Based Framework for Role-Based Delegation, SACMAT'01, May 3-4, 2001, Chantilly, Virginia, USA, pp. 153-162.
Mohammed A. Al-Kahtani, et al., Induced Role Hierarchies with Attribute-Based RBAC, SACMAT'03, Jun. 1-4, 2003, Como, Italy, pp. 1-7.
Longhua Zhang, et al., A Rule-Based Framework for Role-Based Delegation and Revocation, ACM Transactions on Information and System Security, vol. 6, No. 3, Aug. 2003, pp. 404-441.
Chang David Yu
Venkataramappa Vishwanath
Williamson Leigh Allen
Cervetti David G
Dillon Justin M.
International Business Machines - Corporation
Schubert Osterrieder & Nickelson PLLC
LandOfFree
Fine-grained authorization by authorization table associated... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Fine-grained authorization by authorization table associated..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Fine-grained authorization by authorization table associated... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4131287