Information security – Access control or authentication – Authorization
Reexamination Certificate
2006-11-03
2011-11-15
Pearson, David J (Department: 2438)
Information security
Access control or authentication
Authorization
C713S182000, C713S183000, C713S184000, C713S185000, C726S004000, C726S005000, C726S009000, C726S017000, C726S019000
Reexamination Certificate
active
08060932
ABSTRACT:
An authorization framework located external to an application may be invoked to determine user authorization for a requested application component. Small amounts of supplemental authentication code are added to application code to invoke provider modules within the authentication framework. The provider modules perform authorization functions outside of the application and return authorization results to the application. The functions include determining a user role, determining the permissions associated with the user role, comparing the role permissions to the security defined on the requested application component by a rule, and returning an authorization state to the authentication framework. The supplemental authentication code may invoke one or more providers through provider interfaces that translate requests to a particular provider. Using the provider based authorization framework, authorization for an application component is achieved externally without hard-coding authorization code within the application itself.
REFERENCES:
patent: 6055637 (2000-04-01), Hudson et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6381579 (2002-04-01), Gervais et al.
patent: 6453353 (2002-09-01), Win et al.
patent: 6460141 (2002-10-01), Olden
patent: 6782379 (2004-08-01), Lee
patent: 6985955 (2006-01-01), Gullotta et al.
patent: 6990527 (2006-01-01), Spicer et al.
patent: 2003/0115484 (2003-06-01), Moriconi et al.
patent: 2004/0024764 (2004-02-01), Hsu et al.
patent: 2004/0205342 (2004-10-01), Roegner
patent: 2004/0210452 (2004-10-01), Aboujaoude et al.
patent: 2005/0102154 (2005-05-01), Dodd et al.
patent: 2006/0015933 (2006-01-01), Ballinger et al.
Ferraiolo, et al., “The Role Control Center: Features and Case Studies”, SACMAT'03, Jun. 2-3, 2003, pp. 12-20, ACM, 2003, Como, Italy.
Bhatti, et al., “X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control”, ACM Transactions on Information and Systems Security, vol. 8, No. 4, Nov. 2005, pp. 388-423.
Lin, et al. “Security in Enterprise Networking: A Quick Tour”, IEEE Communications Magazine, Jan. 1996, 0163-6804/96, pp. 56-61.
ENDFORCE, Inc., “ENDFORCE Enterprise—How It Works”, http://www.endforce.com/Products/EFEHowItWorks.asp.
Brown Mark
Dolly Nathan
Kayal Saivendra
Mohammed Mannan
Tielke Ron
Holmes Angela
Microsoft Corporation
Pearson David J
Vierra Magen Marcus & DeNiro LLP
LandOfFree
Modular enterprise authorization solution does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Modular enterprise authorization solution, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Modular enterprise authorization solution will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4298675