Method and system for verifying a client request

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S004000, C726S021000, C726S002000, C705S051000, C705S052000

Reexamination Certificate

active

09696736

ABSTRACT:
A system and method are presented for authorizing execution of requested actions transmitted between clients and servers of a data processing system. The method includes receiving a message including a set of actions and simulating execution of the set of actions. A list representing allowable actions and user-definable inputs to the simulated actions is defined. The list of allowable actions and user-definable inputs to the allowable action is then compared to user-requested actions and inputs. When elements within the user-requested actions and inputs are included in the allowable actions and input list, the user-requested actions and inputs are authorized for execution.

REFERENCES:
patent: 5347578 (1994-09-01), Duxbury
patent: 5559800 (1996-09-01), Mousseau et al.
patent: 5611048 (1997-03-01), Jacobs
patent: 5623601 (1997-04-01), Vu
patent: 5870544 (1999-02-01), Curtis
patent: 5908469 (1999-06-01), Botz et al.
patent: 5940590 (1999-08-01), Lynne et al.
patent: 6202199 (2001-03-01), Wygodny et al.
patent: 6289462 (2001-09-01), McNabb et al.
Bieber et al., “Formal Techniques for an ITSEC-E4 Secure Gateway”,1996, pp. 236-245.
Freemand, et al. “Developing Secure System: Issues and Solutions”, 1998, pp. 183-190.
Kogan et al., “An Audit Model for Objected-Oriented Databases”, 1991, pp. 90-99.
Lin et al., “Abstraction-Based Misuse Detection: High-Level Specifications an Adaptable Strategies”.
Petersen et al., “IDA-Intrusion Detection Alert”,1992, pp. 306-311.
Sandhu et al., “Role-Based Access Control: A Multi-Dimensional View”, 1994, pp. 54-62.
Song, et al., “Design and Implementation of a Security Management System”, 1995, pp. 261-264.
International Preliminary Examination Report dated Aug. 6, 2002.
Lin et al., “Abstraction-Based Misuse Detection: High-Level Specifications an Adaptable Strategies”, 1998, p. 1-12, Proceedings of 11thComp. Sec. Found. Workshop.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for verifying a client request does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for verifying a client request, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for verifying a client request will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3863548

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.