Method for integrated security roles

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S238000

Reexamination Certificate

active

07454786

ABSTRACT:
A method for integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.

REFERENCES:
patent: 5708812 (1998-01-01), Van Dyke et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5930801 (1999-07-01), Falkenhainer et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6044466 (2000-03-01), Anand et al.
patent: 6067623 (2000-05-01), Blakely, III et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6263442 (2001-07-01), Mueller et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6308273 (2001-10-01), Goertzel et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6385724 (2002-05-01), Andrews et al.
patent: 6412070 (2002-06-01), Van Dyke et al.
patent: 6453353 (2002-09-01), Win et al.
patent: 6466932 (2002-10-01), Dennis et al.
patent: 6526513 (2003-02-01), Rich et al.
patent: 6708276 (2004-03-01), Rich et al.
patent: 6950825 (2005-09-01), Chang et al.
patent: 7010600 (2006-03-01), Prasad et al.
patent: 2001/0014943 (2001-08-01), Wray
patent: 2002/0010679 (2002-01-01), Felsher
patent: 2002/0019936 (2002-02-01), Hitz et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0112155 (2002-08-01), Martherus et al.
patent: 2002/0152212 (2002-10-01), Feldman
patent: 2003/0023880 (2003-01-01), Edwards et al.
patent: 2003/0084324 (2003-05-01), Nadalin et al.
patent: 2003/0084325 (2003-05-01), Koved et al.
patent: 2004/0128559 (2004-07-01), Zurko et al.
patent: 2004/0186836 (2004-09-01), Schlesinger
Epstein et al., “Engineering of Role/Permission Assignments,” Computer Security Applications Conference 17th, Dec. 10-14, 2001, p. 127-36.
“Mapping Roles to Groups and Users,” www.orionserver.com, downloaded Nov. 20, 2002 (2 pages).
Lowy, J., “Unify the Role-based Security Models for Enterprise and Application Domains with .Net”, msdn magazine, May 2002, p. 58-64 (missing page contains advertisements).
A.C. Kapadia, “A Dynamic Role Translation Model for Secure Interoperability,” Internet: URL: http://citeseer.ist.psu.edu/kapadia01irbac.html, 2001 (41 pages).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for integrated security roles does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for integrated security roles, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for integrated security roles will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4025744

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.