Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2004-10-21
2010-02-23
Zand, Kambiz (Department: 2434)
Information security
Prevention of unauthorized use of data including prevention...
C726S028000, C707S793000
Reexamination Certificate
active
07669244
ABSTRACT:
A method and apparatus for generating user group identifiers using a permissions matrix is disclosed. The permissions matrix includes an entry that is associated with a row and a column of the permissions matrix. The row of the permissions matrix is indexed with a first role and the column of the permissions matrix is indexed with a second role. A data structure implementing such a method can include, for example, a user group identifier matrix. Alternatively, a method is disclosed in which the expiration of a user group identifier is detected. In such a case, the user group identifier is updated by accessing a user group identifier matrix.
REFERENCES:
patent: 4922486 (1990-05-01), Lidinsky et al.
patent: 5017917 (1991-05-01), Fisher et al.
patent: 5113442 (1992-05-01), Moir
patent: 5251205 (1993-10-01), Callon et al.
patent: 5615264 (1997-03-01), Kazmierczak et al.
patent: 5764762 (1998-06-01), Kazmierczak
patent: 5787427 (1998-07-01), Benantar et al.
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 5968177 (1999-10-01), Batten-Carew et al.
patent: 6014666 (2000-01-01), Helland et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6088659 (2000-07-01), Kelley et al.
patent: 6092191 (2000-07-01), Shimbo et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6233618 (2001-05-01), Shannon
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6292798 (2001-09-01), Dockter et al.
patent: 6304973 (2001-10-01), Williams
patent: 6405259 (2002-06-01), Cheston et al.
patent: 6449643 (2002-09-01), Hyndman et al.
patent: 6711172 (2004-03-01), Li
patent: 6754214 (2004-06-01), Mahalingaiah
patent: 6973057 (2005-12-01), Forslow
patent: 6985948 (2006-01-01), Taguchi et al.
patent: 7000120 (2006-02-01), Koodli et al.
patent: 7032243 (2006-04-01), Leerssen et al.
patent: 7136374 (2006-11-01), Kompella
patent: 7207062 (2007-04-01), Brustoloni
patent: 7284269 (2007-10-01), Marquet et al.
patent: 7417950 (2008-08-01), Hofmeister et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0035635 (2002-03-01), Holden
patent: 2002/0184521 (2002-12-01), Lucovsky et al.
patent: 2003/0088786 (2003-05-01), Moran et al.
patent: 2003/0110268 (2003-06-01), Kermarec et al.
patent: 2003/0145232 (2003-07-01), Poletto et al.
patent: 2003/0154400 (2003-08-01), Pirttimaa et al.
patent: 2004/0017816 (2004-01-01), Ishwar et al.
patent: 2004/0044908 (2004-03-01), Markham et al.
patent: 2004/0156313 (2004-08-01), Hofmeister et al.
patent: 2004/0202171 (2004-10-01), Hama
patent: 2004/0264697 (2004-12-01), Gavrilescu et al.
patent: 2005/0055573 (2005-03-01), Smith
patent: 2005/0097357 (2005-05-01), Smith
patent: 2005/0177717 (2005-08-01), Grosse
patent: 2005/0190758 (2005-09-01), Gai et al.
patent: 2005/0198412 (2005-09-01), Pedersen et al.
patent: 2006/0010483 (2006-01-01), Buehler et al.
patent: 2006/0090208 (2006-04-01), Smith
patent: 2006/0106750 (2006-05-01), Smith
patent: 2006/0112425 (2006-05-01), Smith et al.
patent: 2006/0112426 (2006-05-01), Smith et al.
patent: 0 465 016 (1991-06-01), None
patent: 0 697 662 (1996-02-01), None
patent: 0 849 680 (1997-12-01), None
patent: 1 067 745 (1999-11-01), None
patent: 2002 164937 (2002-06-01), None
patent: WO 2005/027464 (2005-03-01), None
Pfleeger et al., Security in Computing, 2003, Prentice Hall, 3rd Ed., pp. 194-207.
Islam, An Access Control Method with Subject-Object Key and Time Stamp, Jun. 2003, Malaysian Journal of Computer Science, vol. 16, No. 1, pp. 77-83.
Barkley et al., Supporting Relationships in Access Control Using Role Based Access Control, Jul. 1999.
IEEE Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Common Specifications,Part 3: Media Access Control(MAC)Bridges, ANSI/IEEE Std. 802.1D, 1998 Edition, Dec. 10, 1998, pp. 1-355.
Computer Systems Laboratory, National Institute of Standards and Technology,Standard Security Label for Information Transfer, Federal Information Processing Standards Publication 188 (FIPS PUB 188), Category: Computer Security, Subcategory: Security Labels, Sep. 6, 1994, pp. 1-25.
Wang, Ning and Pavlou, George, Scalable sender access control for bi-directional multicast routing, Computer Networks, Elsevier Science Publishers B.V., vol. 43, No. 5, Dec. 5, 2003, pp. 539-555.
Valenzi, Kathleen D., Digital Signatures: An Important “Sign” of the Future of E-Govemment, virginia.edu, vol. IV, No. 2, Fall 2000, Copyright 2000 The Rector and Board of Visitors of the University of Virginia, 6 pages.
Microsoft® Computer Dictionary, Fifth Edition, Publisher: Microsoft Press, Pub. Date: May 1, 2002, Excerpt of terms: digital signature -digital signature standard & routable protocol—routing table, p. 656.
Stevens, Richard W., TCP/IP Illustrated vol. 1, The Protocols, Copyright © 1994 Addison Wesley Longman, Inc., pp. 112-117.
CDAT Overview, http: www.cisco.com/universalcd/cc/td/doc/, Solution/sesm/sesm—313toolguid/chi1—overview.htm. Copyright 1992-2002 Cisco Systems, Inc.
Campbell Stephenson LLP
Cisco Technology Inc.
Powers William S
Zand Kambiz
LandOfFree
Method and system for generating user group permission lists does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for generating user group permission lists, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for generating user group permission lists will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4158008