Security monitor for controlling functional access to a computer

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

39518701, 39518801, 380 4, 380 25, G06F 1214, H04L 932

Patent

active

058812253

ABSTRACT:
Security functions for a computer system are controlled by a security monitor. A user desiring access to the system inputs a user identification and password combination, and a role the user to assume is selected from among one or more roles defined in the system. Upon being validated as an authorized user performing a particular role, the user is then authorized to perform certain functions and tasks specifically and to see information associated with that role (and optimally the work group the user is assigned). For some users, no role or a "null" roll is chosen, and authorization for certain functions and tasks is accomplished due to that particular user having been predefined by an administrator as being allowed to perform those functions and tasks, usually due to the predefined privileges associated with the work group(s) to which the user belongs.

REFERENCES:
patent: 5263167 (1993-11-01), Conner, Jr. et al.
patent: 5295266 (1994-03-01), Hinsley et al.
patent: 5748890 (1998-05-01), Goldberg et al.
patent: 5752242 (1998-05-01), Havens

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security monitor for controlling functional access to a computer does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security monitor for controlling functional access to a computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security monitor for controlling functional access to a computer will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1330154

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.