Method and system for management of access information

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000

Reexamination Certificate

active

07440962

ABSTRACT:
An improved method and system for centrally managing and accessing attribute information in a distributed computing system is disclosed. Applications set up application specific user attributes in a directory. When an application user connects to a server, the server automatically accesses the directory to identify the relevant user attributes for that application. These user attributes are retrieved and stored in the session context. Standard LDAP attributes can also be retrieved from the directory and stored in the session context.

REFERENCES:
patent: 5450581 (1995-09-01), Bergen et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5708812 (1998-01-01), Van Dyke et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5884316 (1999-03-01), Bernstein et al.
patent: 5899987 (1999-05-01), Yarom
patent: 6119230 (2000-09-01), Carter
patent: 6145086 (2000-11-01), Bellemore et al.
patent: 6158010 (2000-12-01), Moriconi et al.
patent: 6178511 (2001-01-01), Cohen et al.
patent: 6192130 (2001-02-01), Otway
patent: 6240512 (2001-05-01), Fang et al.
patent: 6243816 (2001-06-01), Fang et al.
patent: 6253216 (2001-06-01), Sutcliffe et al.
patent: 6275944 (2001-08-01), Kao et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6321259 (2001-11-01), Ouellette et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6377950 (2002-04-01), Peters et al.
patent: 6385724 (2002-05-01), Beckman et al.
patent: 6490591 (2002-12-01), Denbar et al.
patent: 6507817 (2003-01-01), Wolfe et al.
patent: 6535879 (2003-03-01), Behera
patent: 6556995 (2003-04-01), Child et al.
patent: 6651168 (2003-11-01), Kao et al.
patent: 6678682 (2004-01-01), Jenkins et al.
patent: 6768988 (2004-07-01), Boreham et al.
patent: 2002/0007346 (2002-01-01), Qiu et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0069223 (2002-06-01), Goodisman et al.
patent: 2002/0078004 (2002-06-01), Ambrosini et al.
patent: 2002/0082818 (2002-06-01), Ferguson et al.
patent: 2002/0083073 (2002-06-01), Vaidya et al.
patent: 2003/0195888 (2003-10-01), Croft et al.
How to use ADSI to set LDAP Directory Attributes, Microsoft 2000 Standard Edition.
Configuring LDAP the Apache Software Foundation 2003-2006.
Oracle8 Server Concepts, “Privileges and Roles”, Release 8.0, vol. 2, Jun. 1997, pp. 25-1 through 25-15.
Bertino, Elisa, et al., “Controlled Access and Dissemination of XML Documents,” Proceedings of the second international workshop on Web information and data management (Nov. 1999), pp. 22-27.
Bertino, Elisa, et al. “On Specifying Security Policies for Web Documents with an XML-based Language,”, Proceedings of the sixth ACM symposium on Access control models and technologies (May 2001), pp. 57-65.
Bonczek, Robert H., et al. “A Transformational Grammar-Based Query Processor for Access Control in a Planning System,” ACM Transactions on Database Systems, (Dec. 1977) pp. 326-338, vol. 2, No. 4.
Castano, Silvana, et al., “A New Approach to Security System Development,” Proceedings of the 1994 workshop on New security paradigms (Aug. 1994), pp. 82-88.
Gladney, H.M., “Access Control for Large Collections,” ACM Transactions on Information Systems (Apr. 1997), pp. 154-194, vol. 15, No. 2.
Hsiao, David K., “A Software Engineering Experience In The Management, Design and Implementation of a Data Secure System,” Proceedings of the 2ndinternational conference on Software engineering (Oct. 1976), pp. 532-538.
Myers, Andrew C. et al., “Protecting Privacy Using the Decentralized Label Model,” ACM Transactions on Software Engineering and Methodology (Oct. 2000), pp. 410-442, vol. 9, No. 4.
Sandhu, Ravinderpal Singh, “The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Schemes,” Journal of the Association for Computing Machinery (Apr. 1988), pp. 404-432, vol. 35, No. 2.
Sion, Radu, et al., “Rights Protection for Relational Data,” Proceedings of the 2003 ACM SIGMOD international conference on Management of data (Jun. 2003) pp. 98-109.
Wedde, Horst F. et al., “Role-Based Access Control in Ambient and Remote Space,” Proceedings of the ninth ACM symposium on Access control models and technologies (Jun. 2004) pp. 21-30.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for management of access information does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for management of access information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for management of access information will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4018504

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.