Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2011-01-04
2011-01-04
Gaffin, Jeffrey A (Department: 2133)
Information security
Prevention of unauthorized use of data including prevention...
C726S017000
Reexamination Certificate
active
07865959
ABSTRACT:
A method and system for managing access information for users and other entities in a distributed computing system is disclosed. In one approach, information relating to user access is stored in a centralized directory while user roles are locally defined at a networked node. When the user connects to the system, the system looks up the necessary information about the user in the central directory to authorize the user. Thereafter, the user's privileges are determined by the user's assigned roles.
REFERENCES:
patent: 5386557 (1995-01-01), Boykin et al.
patent: 5450581 (1995-09-01), Bergen et al.
patent: 5497463 (1996-03-01), Stein et al.
patent: 5579222 (1996-11-01), Bains et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5708812 (1998-01-01), Van Dyke et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5884316 (1999-03-01), Bernstein et al.
patent: 5899987 (1999-05-01), Yarom
patent: 5983350 (1999-11-01), Minear et al.
patent: 6092189 (2000-07-01), Fisher et al.
patent: 6119230 (2000-09-01), Carter
patent: 6126328 (2000-10-01), Mallory et al.
patent: 6145086 (2000-11-01), Bellemore et al.
patent: 6158007 (2000-12-01), Moreh et al.
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6192130 (2001-02-01), Otway
patent: 6240512 (2001-05-01), Fang et al.
patent: 6243816 (2001-06-01), Fang et al.
patent: 6253216 (2001-06-01), Sutcliffe et al.
patent: 6260039 (2001-07-01), Schneck et al.
patent: 6275944 (2001-08-01), Kao et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6321259 (2001-11-01), Ouellette et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6377950 (2002-04-01), Peters et al.
patent: 6385724 (2002-05-01), Beckman et al.
patent: 6487552 (2002-11-01), Lei et al.
patent: 6490591 (2002-12-01), Denbar et al.
patent: 6507817 (2003-01-01), Wolfe et al.
patent: 6535879 (2003-03-01), Behera
patent: 6556995 (2003-04-01), Child et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6678682 (2004-01-01), Jenkins et al.
patent: 6768988 (2004-07-01), Boreham et al.
patent: 2001/0023440 (2001-09-01), Franklin et al.
patent: 2002/0007346 (2002-01-01), Qui et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0069223 (2002-06-01), Goodisman et al.
patent: 2002/0078004 (2002-06-01), Ambrosini et al.
patent: 2002/0082818 (2002-06-01), Ferguson et al.
patent: 2002/0083073 (2002-06-01), Vaidya et al.
patent: 2003/0195888 (2003-10-01), Croft et al.
Oracle8 Server Concepts, “Privileges and Roles”, Release 8.0, vol. 2, Jun. 1997, pp. 25-1 through 25-15.
Bertino, E. et al. “Controlled Access and Dissemination of XML Documents”Proceedings of the 2ndInternational Workshop on Web Information and Data Management(Nov. 1999) pp. 22-27.
Bertino, E. et al. “On Specifying Security Policies for Web Documents with an XML-Based Language”Proceedings of the 6thACM Symposium on Access Control Models and Technologies(May 2001) pp. 57-65.
Bonczek, R.H. et al. “A Transformational Grammar-Based Query Processor for Access Control in a Planning System”ACM Transactions on Database Systems(TODS) (Dec. 1977) 2(4):326-338.
Castano, S. et al. “A New Approach to Security System Development”Proceedings of the 1994 Workshop on New Security Paradigms(Aug. 1994) pp. 82-88.
Gladney, H.M. “Access Control for Large Collections”ACM Transactions on Information Systems(TOIS) (Apr. 1997) 15(2):154-194.
Hsiao, D.K. “A Software Engineering Experience in the Management, Design and Implementation of a Data Secure System”Proceedings of the 2ndInternational Conference on Software Engineering(Oct. 1976) pp. 532-538.
Myers, A.C. and B. Liskov “Protecting Privacy Using the Decentralized Label Model”ACM Transactions on Software Engineering and Methodology(Oct. 2000) 9(4):410-442.
Sandhu, R.S. “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes”Journal of the Association of Computing Machinery(JACM) (Apr. 1988) 35(2):404-432.
Sion, R. et al. “Data Security and Protection: Rights Protection for Relational Data”Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data(Jun. 2003) pp. 98-109.
Weede, H.F. and M. Lischka “Role-Based Access Control in Ambient and Remote Space”Proceedings of the 9thACM Symposium on Access Control Models and Technologies(Jun. 2004) pp. 21-30.
How to: “Use ADSI to Set LDAP Directory Attributes”, Microsoft 2000 Edition, Sep. 28, 2007, Revision: 3.3.
“Configuring LDAP”, The Apache Software Foundation 2003-2009.
Gaffin Jeffrey A
Gandhi Dipakkumar
Oracle International Corporation
Vista IP Law Group LLP.
LandOfFree
Method and system for management of access information does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for management of access information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for management of access information will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2644537