Management of user authorizations

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S001000, C726S028000, C705S051000, C713S185000

Reexamination Certificate

active

08042158

ABSTRACT:
A method of determining unauthorized user access requests in a data processing system, the method comprising the steps of accessing a record of role managed authorizations and a record of manually assigned authorizations, receiving a record of user authorization requests from a plurality of data processing systems, and comparing the record of user authorization requests to the record of role managed authorizations and to the record of manually assigned authorizations to identify any unauthorized authorizations.

REFERENCES:
patent: 6237036 (2001-05-01), Ueno et al.
patent: 6871232 (2005-03-01), Curie et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2003/0135755 (2003-07-01), Hahn
patent: 2003/0187846 (2003-10-01), Bangel et al.
patent: 2005/0138420 (2005-06-01), Sampathkumar et al.
patent: 2005/0289234 (2005-12-01), Dai et al.
patent: 2006/0089932 (2006-04-01), Buehler et al.
patent: 0547990 (1992-11-01), None
patent: 1768048 (2006-09-01), None
patent: 2430283 (2006-09-01), None
patent: WO 0000896 (1999-05-01), None
Thomas, Roshan K. (Odyssey Research Associates), “Team-based Access Control (TMAC): A primitive for Applying Role-based Access Controls in Collaborative Environments”, Proceedings of the ACM Workshop on Role-Based Access Control, 1997, pp. 13-19.
“Identity and Access Management”, Oct. 26, 2004, Avaya Inc. and Earnst & Young LLP http://conference.digitalidworld.com/2004/attendees/slides/1026—1700—F.pdf.
Forster, Jacques (Solution Architect, OPNS), “Role Based Access Control Privilege Management the Pragmatic Way”, Open Forum 2006, http:/www.opns.be/pdf/RoleBasedAccessControl.pdf.
Cheng, Edward C., “An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications”, Proceedings of the 32nd Hawaii International Conference on System Sciences—1999, http:csd12.computer.org/comp/proceedings/hicss/1999/0001/08/00019022.PDF.
Shin, Dongwan et al., “A Role-Based Infrastructure Management System: Design and Implementation”, Concurrency and Computation: Practice and Experience, v 16, n 11, Sep. 2004, Computer Security, pp. 1121-1141.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Management of user authorizations does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Management of user authorizations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Management of user authorizations will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4279922

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.