Cryptography – Key management – Having particular key generator
Patent
1997-04-14
1999-03-09
Hua, Ly
Cryptography
Key management
Having particular key generator
39518701, 39518801, 380 4, 380 25, G06F 1214, H04L 932
Patent
active
058812253
ABSTRACT:
Security functions for a computer system are controlled by a security monitor. A user desiring access to the system inputs a user identification and password combination, and a role the user to assume is selected from among one or more roles defined in the system. Upon being validated as an authorized user performing a particular role, the user is then authorized to perform certain functions and tasks specifically and to see information associated with that role (and optimally the work group the user is assigned). For some users, no role or a "null" roll is chosen, and authorization for certain functions and tasks is accomplished due to that particular user having been predefined by an administrator as being allowed to perform those functions and tasks, usually due to the predefined privileges associated with the work group(s) to which the user belongs.
REFERENCES:
patent: 5263167 (1993-11-01), Conner, Jr. et al.
patent: 5295266 (1994-03-01), Hinsley et al.
patent: 5748890 (1998-05-01), Goldberg et al.
patent: 5752242 (1998-05-01), Havens
Araxsys, Inc.
Hua Ly
LandOfFree
Security monitor for controlling functional access to a computer does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security monitor for controlling functional access to a computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security monitor for controlling functional access to a computer will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1330154