Method and system for implementing current user links

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S229000, C709S228000, C713S167000

Reexamination Certificate

active

07062563

ABSTRACT:
A method and system for managing access information for users and other entities in a distributed computing system is disclosed. An aspect of the invention relates to current user links between a first computing node and a second computing node. Objects are created/maintained to identify allowable links between computing nodes. Objects can also be created/maintained to store identification of chains of links. The current user link allows access for a user from the first computing node to the second computing node without user authentication by the second computing node. This can be implemented using trust relationships between the first and second computing nodes. Transitive aspects of the trust relationships can be handled by accessing information about chains of users
odes. In addition, trust relationships can be administered by a local computing node.

REFERENCES:
patent: 5450581 (1995-09-01), Bergen et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5708812 (1998-01-01), Van Dyke et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5884316 (1999-03-01), Bernstein et al.
patent: 5899987 (1999-05-01), Yarom
patent: 6119230 (2000-09-01), Carter
patent: 6145086 (2000-11-01), Bellemore et al.
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6192130 (2001-02-01), Otway
patent: 6240512 (2001-05-01), Fang et al.
patent: 6243816 (2001-06-01), Fang et al.
patent: 6253216 (2001-06-01), Sutcliffe et al.
patent: 6275944 (2001-08-01), Kao et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6321259 (2001-11-01), Ouellette et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6377950 (2002-04-01), Peters et al.
patent: 6385724 (2002-05-01), Beckman et al.
patent: 6490591 (2002-12-01), Denbar et al.
patent: 8507817 (2003-01-01), Wolfe et al.
patent: 6535879 (2003-03-01), Behera
patent: 6556995 (2003-04-01), Child et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6678682 (2004-01-01), Jenkins et al.
patent: 6768988 (2004-07-01), Boreham et al.
patent: 2002/0007346 (2002-01-01), Qiu et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0069223 (2002-06-01), Goodisman et al.
patent: 2002/0078004 (2002-06-01), Ambrosini et al.
patent: 2002/0082818 (2002-06-01), Ferguson et al.
patent: 2002/0083073 (2002-06-01), Vaidya et al.
patent: 2003/0195888 (2003-10-01), Croft et al.
Oracle8 Server Concepts, “Privileges and Roles”, Release 8.0, vol. 2, Jun. 1997, pp. 25-1 through 25-15.
Bertino, E. et al. “Controlled Access and Dissemination of XML Documents”Proceedings of the 2ndInternational Workshop on Web Information and Date Management(Nov. 1999) pp. 22-27.
Bertino, E. et al. “On Specifying Security Policies for Web Documents with an XML-Based Language”Proceedings of the 6thACM Symposium on Access Control Models and Technologies(May 2001) pp. 57-65.
Bonczek, R.H. et al. “A Transformational Grammar-Based Query Processor for Access Control in a Planning System”ACM Transactions on Database Systems(TODS) (Dec. 1977) 2(4):326-338.
Castano, S. et al. “A New Approach to Security System Development”Proceedings of the 1994 Workshop on New Security Paradigms(Aug. 1994) pp. 82-88.
Gladney, H.M. “Access Control for Large Collections”ACM Transactions on Information Systems(TOIS) (Apr. 1997) 15(2):154-194.
Hsiao, D.K. “A Software Engineering Experience in the Management, Design and Implementation of a Data Secure System”Proceedings of the 2ndInternational Conference on Software Engineering(Oct. 1976) pp. 532-538.
Myers, A.C. and B. Liskov “Protecting Privacy Using the Decentralized Label Model”ACM Transactions on Software Engineering and Methodology(Oct. 2000) 9(4):410-442.
Sandhu, R.S. “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes”Journal of the Association of Computing Machinery(JACM) (Apr. 1988) 35(2):404-432.
Sion, R. et al. “Data Security and Protection: Rights Protection for Relational Data”Proceedings of the 2003 ACM SIGMOD International Conference on Management of Date(Jun. 2003) pp. 98-109.
Weede, H.F. and M. Lischka “Role-Based Access Control in Ambient and Remote Space”Proceedings of the 9thACM Symposium on Access Control Models and Technologies(Jun. 2004) pp. 21-30.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for implementing current user links does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for implementing current user links, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for implementing current user links will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3700896

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.