Method for controlling access to a computer resource based on a

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

G06F 1100

Patent

active

055640168

ABSTRACT:
A method for controlling access to a resource running on a host computer by one or more users which uses a timing policy to control when a current authorized user can be replaced by a new authorized user. The method comprises the steps of scanning a first list to verify that the new user is on the first list, scanning a second list to determine if a current user can be replaced without violating the timing policy, and granting the new user access to the resource if the timing policy is not violated. The method can be used to control access to an application program running on a file server in a local area network.

REFERENCES:
patent: 4348696 (1982-09-01), Beier
patent: 4941175 (1990-07-01), Enescu et al.
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5048085 (1991-09-01), Abraham et al.
patent: 5091939 (1992-02-01), Cole et al.
patent: 5148481 (1992-09-01), Abraham et al.
patent: 5187352 (1993-02-01), Blair et al.
patent: 5226080 (1993-07-01), Cole et al.
patent: 5233658 (1993-08-01), Bianco et al.
patent: 5367704 (1994-11-01), Hasuo et al.
Harn et al "Integration of user authentication and access control" IEEE Procedinas vol. 139, No. 2, Mar. 1992.
White, Fisch and Pooch "Computer System and Network Security", CRC Pess 1995 pp. 37-51, 75-89 and 155-187.
Miller et al., "Access Control By Boolean Expression Evaluatin", 1990 IEEE pp. 131-139.
M. Burrows, M. Abadi and R. Needham, "A Logic of Authentication," ACM Transactions on Computer Systems, vol. 8, No. 1, pp. 18-36 (Feb. 1990).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for controlling access to a computer resource based on a does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for controlling access to a computer resource based on a , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for controlling access to a computer resource based on a will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-64526

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.