Information security – Access control or authentication – Network
Reexamination Certificate
2003-03-27
2008-11-18
Barron, Jr., Gilberto (Department: 2132)
Information security
Access control or authentication
Network
C709S238000
Reexamination Certificate
active
07454786
ABSTRACT:
A method for integrated security roles is presented. An upstream application includes one or more role-mapping requirements that correspond to an upstream security role and a downstream security role. The upstream security role is expanded by adding an upstream security role identifier in a downstream application's role-mapping table or by adding upstream user-to-role mappings to a downstream application's role-mapping table. When an upstream security role is expanded, a user assigned to the upstream security role automatically has access to role-mapped downstream applications.
REFERENCES:
patent: 5708812 (1998-01-01), Van Dyke et al.
patent: 5768519 (1998-06-01), Swift et al.
patent: 5930801 (1999-07-01), Falkenhainer et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6044466 (2000-03-01), Anand et al.
patent: 6067623 (2000-05-01), Blakely, III et al.
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6263442 (2001-07-01), Mueller et al.
patent: 6289462 (2001-09-01), McNabb et al.
patent: 6308273 (2001-10-01), Goertzel et al.
patent: 6339423 (2002-01-01), Sampson et al.
patent: 6385724 (2002-05-01), Andrews et al.
patent: 6412070 (2002-06-01), Van Dyke et al.
patent: 6453353 (2002-09-01), Win et al.
patent: 6466932 (2002-10-01), Dennis et al.
patent: 6526513 (2003-02-01), Rich et al.
patent: 6708276 (2004-03-01), Rich et al.
patent: 6950825 (2005-09-01), Chang et al.
patent: 7010600 (2006-03-01), Prasad et al.
patent: 2001/0014943 (2001-08-01), Wray
patent: 2002/0010679 (2002-01-01), Felsher
patent: 2002/0019936 (2002-02-01), Hitz et al.
patent: 2002/0026592 (2002-02-01), Gavrila et al.
patent: 2002/0112155 (2002-08-01), Martherus et al.
patent: 2002/0152212 (2002-10-01), Feldman
patent: 2003/0023880 (2003-01-01), Edwards et al.
patent: 2003/0084324 (2003-05-01), Nadalin et al.
patent: 2003/0084325 (2003-05-01), Koved et al.
patent: 2004/0128559 (2004-07-01), Zurko et al.
patent: 2004/0186836 (2004-09-01), Schlesinger
Epstein et al., “Engineering of Role/Permission Assignments,” Computer Security Applications Conference 17th, Dec. 10-14, 2001, p. 127-36.
“Mapping Roles to Groups and Users,” www.orionserver.com, downloaded Nov. 20, 2002 (2 pages).
Lowy, J., “Unify the Role-based Security Models for Enterprise and Application Domains with .Net”, msdn magazine, May 2002, p. 58-64 (missing page contains advertisements).
A.C. Kapadia, “A Dynamic Role Translation Model for Secure Interoperability,” Internet: URL: http://citeseer.ist.psu.edu/kapadia01irbac.html, 2001 (41 pages).
Chang David Yu
Chao Ching-Yun
Barron Jr. Gilberto
Herring Virgil
International Business Machines - Corporation
Rodriguez Herman
Van Leeuwen & Van Leeuwen
LandOfFree
Method for integrated security roles does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for integrated security roles, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for integrated security roles will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4025744