Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Central trusted authority provides computer authentication
Reexamination Certificate
2007-02-27
2007-02-27
Moazzami, Nasser (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Central trusted authority provides computer authentication
C713S167000, C726S027000, C726S017000, C707S793000, C707S793000, C707S793000, C707S793000
Reexamination Certificate
active
09611913
ABSTRACT:
An input/output interface receives an access request from a requester. A processor associated with the input/output interface applies a filter operation to select a subset of rules from a master set of rules maintained within an authorization database. Rules can be selected in this manner using filter operations so that all rules in the rule set need not be processed. A rule may include a disregard instruction. The processor further performs at least one rule operation based on the subset of rules to produce an access control decision in the memory system until either a rule operation including a disregard instruction is performed to limit performance of rule operations in the selected set of rules or until all rule operations in the selected set of rules that are applicable to the access control decision are performed.
REFERENCES:
patent: 4754410 (1988-06-01), Leech et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 6236996 (2001-05-01), Bapat et al.
patent: 6298340 (2001-10-01), Calvignac et al.
patent: 6385598 (2002-05-01), Giacalone et al.
patent: 6408336 (2002-06-01), Schneider et al.
patent: 6460141 (2002-10-01), Olden
patent: 6473763 (2002-10-01), Corl et al.
patent: 6502093 (2002-12-01), Bhatt et al.
patent: 6539394 (2003-03-01), Calvignac et al.
patent: 2004/0158744 (2004-08-01), Deng et al.
http://www.freenic.net/rfcs/rfc1400/rfc1457.html, FreeNIC.NET, Network Information Center, R. Housley, May 1993, 13 pages.
A User-Centered, Modular Authorization Service Built on an RBAC Foundation, Zurko, et al., 14 pages.
Netegrity™ , Secure User Management for Intranet and Extranet Web Sites, Netegrity White Paper, Jan. 1999, Revision: Jan. 21, 1999, 31 pages.
Securant Technologies; Understanding ClearTrust for the Businessperson; http://www.securant.com/products/bus—focus/index.html; Jan. 10, 2001; 1 page.
Securant Technologies; Pillar One Access Control; http://www.securant.com/products/tech—focus/thetech/8pil/acc—cont.html; Jan. 10, 2001; 1 page.
Securant Technologies; For the Engineer Frequently Asked Questions; http://www.securant.com/products/tech—focus/tech—faq.html; Jan. 10, 2001; 8 pages.
Chapin IP Law LLC
Chapin, Esq. Barry W.
Colin Carl G.
EMC Corporation
Moazzami Nasser
LandOfFree
Methods and apparatus for controlling access to a resource does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and apparatus for controlling access to a resource, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for controlling access to a resource will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3892972