System and method for controlling access to documents stored...

Information security – Access control or authentication

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S026000

Reexamination Certificate

active

07543329

ABSTRACT:
A system and method of limiting access from an external network to documents stored on an internal network. A client list is built in which each client is assigned to one or more roles. Each role has access to one or more documents as defined on a document list. A request from an external network is reviewed and, if possible, the request is associated with a client on the client list. The requested document is then compared to the document list associated with the client's role and, if the requested document is in the list of documents available to a client in the client's role, the requested document is fetched, cleaned and sent to the client.

REFERENCES:
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4177510 (1979-12-01), Appell et al.
patent: 4584639 (1986-04-01), Hardy
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4701840 (1987-10-01), Boebert et al.
patent: 4713753 (1987-12-01), Boebert et al.
patent: 4914568 (1990-04-01), Kodosky et al.
patent: 5124984 (1992-06-01), Engel
patent: 5179658 (1993-01-01), Izawa et al.
patent: 5204812 (1993-04-01), Kasiraj et al.
patent: 5272754 (1993-12-01), Boerbert
patent: 5276735 (1994-01-01), Boebert et al.
patent: 5311593 (1994-05-01), Carmi
patent: 5329623 (1994-07-01), Smith et al.
patent: 5335346 (1994-08-01), Fabbio
patent: 5408082 (1995-04-01), Takagi et al.
patent: 5455953 (1995-10-01), Russell
patent: 5544321 (1996-08-01), Theimer et al.
patent: 5566170 (1996-10-01), Bakke et al.
patent: 5586260 (1996-12-01), Hu
patent: 5606668 (1997-02-01), Shwed
patent: 5619648 (1997-04-01), Canale et al.
patent: 5623601 (1997-04-01), Vu
patent: 5636371 (1997-06-01), Yu
patent: 5673322 (1997-09-01), Pepe et al.
patent: 5684951 (1997-11-01), Goldman et al.
patent: 5689566 (1997-11-01), Nguyen
patent: 5701137 (1997-12-01), Kiernan et al.
patent: 5701458 (1997-12-01), Bsaibes et al.
patent: 5708780 (1998-01-01), Levergood et al.
patent: 5715403 (1998-02-01), Stefik
patent: 5778222 (1998-07-01), Herrick et al.
patent: 5784566 (1998-07-01), Viavant et al.
patent: 5802299 (1998-09-01), Logan et al.
patent: 5819271 (1998-10-01), Mahoney et al.
patent: 5826029 (1998-10-01), Gore, Jr. et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5864871 (1999-01-01), Kitain et al.
patent: 5870544 (1999-02-01), Curtis
patent: 5878415 (1999-03-01), Olds
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5884312 (1999-03-01), Dustan et al.
patent: 5892905 (1999-04-01), Brandt et al.
patent: 5892909 (1999-04-01), Grasso et al.
patent: 5903732 (1999-05-01), Reed et al.
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 5913024 (1999-06-01), Green et al.
patent: 5915087 (1999-06-01), Hammond et al.
patent: 5918013 (1999-06-01), Mighdoll et al.
patent: 5933600 (1999-08-01), Shieh et al.
patent: 5933826 (1999-08-01), Ferguson
patent: 5950195 (1999-09-01), Stockwell et al.
patent: 5958008 (1999-09-01), Pogrebisky et al.
patent: 5961601 (1999-10-01), Iyengar
patent: 5987611 (1999-11-01), Freund
patent: 5991877 (1999-11-01), Luckenbaugh
patent: 5999978 (1999-12-01), Angal et al.
patent: 6014666 (2000-01-01), Helland et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6029247 (2000-02-01), Ferguson
patent: 6044373 (2000-03-01), Gladney et al.
patent: 6055637 (2000-04-01), Hudson et al.
patent: 6088451 (2000-07-01), He et al.
patent: 6088679 (2000-07-01), Barkley
patent: 6105028 (2000-08-01), Sullivan et al.
patent: 6119122 (2000-09-01), Bunnell
patent: 6141754 (2000-10-01), Choy
patent: 6158007 (2000-12-01), Moreh et al.
patent: 6453353 (2002-09-01), Win et al.
patent: 7131133 (2006-10-01), Kawakura et al.
patent: 0697662 (1996-02-01), None
patent: 0743777 (1996-11-01), None
patent: 0811939 (1997-12-01), None
patent: WO-96/13113 (1996-05-01), None
patent: WO-97/13340 (1997-04-01), None
patent: WO-97/16911 (1997-05-01), None
patent: WO-97/26731 (1997-07-01), None
Ancilotti, P., et al., “Language Features for Access Control”,IEEE Transactions on Software Engineering, SE-9, (Jan. 1983), 16-25.
Atkinson, R., “IP Authentication Header”, Network Working Group, Request For Comment No. 1826, http//ds.internic.net/rfc/rfc1826.txt,(Aug. 1995), 11 p.
Atkinson, R., “IP Encapsulating Security Payload (ESP)”, Network Working Group, Request For Comment No. 1827, http//ds.internic.net/rfc/rfc1827.txt,(Aug. 1995), 12 p.
Atkinson, R., “Security Architecture for the Internet Protocol”, Network Working Group, Request for Comment No. 1825, http//ds.internic.net/rfc/rfc1827.txt,(Aug. 1995),21 p.
Baclace, P. E., “Competitive Agents for Information Filtering”,Communications of the ACM, 35, (Dec. 1992),p. 50.
Badger, Lee , et al., “Practical Domain and Type Enforcement for UNIX”,Proceedings of the 1995 IEEE Symposium on Security and Privacy, (May 1995),p. 66-77.
Belkin, N. J., et al., “Information Filtering and Information Retrieval: Two Sides of the Same Coin?”,Communications of the ACM, 35, (Dec. 1992),29-38.
Bellovin, S. M., et al., “Network Firewalls”,IEEE Communications Magazine, 32, (Sep. 1994),50-57.
Bevier, William R., et al., “Connection Policies and Controlled Interference”,Proceedings of the Eighth IEEE Computer Security Foundations Workshop, Kenmare, Ireland,(Jun. 13-15, 1995),p. 167-176.
Boebert, W. E., et al., “Secure Ada Target: Issues, System Design, and Verification”,Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California,(Apr. 22-24, 1985),p. 59-66.
Boebert, W. E., et al., “Secure Computing: The Secure Ada Target Approach”,Scientific Honeyweller, 6 (2), (Jul. 1985),42-58.
Bowen, T. F., et al., “The Datacycle Architecture”,Communications of the ACM, 35, (Dec. 1992),71-81.
Bryan, J. , “Firewalls For Sale”,BYTE, (Apr. 1995),99-100, 102, 104.
Cobb, S. , “Establishing Firewall Policy”,IEEE, (1996),198-205.
Foltz, P. W., et al., “Personalized Information Delivery: An Analysis of Information Filtering Methods”,Communications of the ACM, 35, (Dec. 1992),51-60.
Gassman, Bill , “Internet Security, and Firewalls Protection on the Internet”,IEEE, (1996),93-107.
Goldberg, D. , et al., “Using Collaborative Filtering to Weave an Information Tapestry”,Communications of the ACM, 35, (Dec. 1992),61-70.
Grampp, F. T., “UNIX Operating System Security”,AT&T Bell Laboratories Technical Journal, 63, (Oct. 1984),1649-1672.
Greenwald, Michael , et al., “Designing an Academic Firewall: Policy, Practice, and Experience with SURF”,IEEE, (1996),79-92.
Haigh, J. T., et al., “Extending the Noninterference Version of MLS for SAT”,Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, CA,(Apr. 7-9, 1986),p. 232-239.
Kahan, Jose , “A capability based authorization model for the world-Wide Web”,Comuter Networks and ISDN Systems, (1995),pp. 1055-1064.
Karn, P. , et al., “The ESP DES-CBC Transform”, Network Working Group, Request for Comment No. 1829, http//ds.internic.net/rfc/rfc1827.txt,(Aug. 1995),9 p.
Kent, S. T., “Internet Privacy Enhanced Mail”,Communications of the ACM, 36, (Aug. 1993),48-60.
Lampson, B. W., et al., “Dynamic Protection Structures”,AFIPS Conference Proceedings, 35, 1969 Fall Joint Computer Conference, Las Vegas, NV,(Nov. 18-20, 1969),27-38.
Lee, K. C., et al., “A Framework for Controlling Cooperative Agents”,Computer, (Jul. 1993),8-16.
Lodin, S. W., et al., “Firewalls Fend Off Invasions from the Net”,IEEE Spectrum, (Feb. 1998),26-34.
Loeb, S. , “Architecting Personalized Delivery of Multimedia Information”,Communications of the ACM, 35, (1992),39-50.
Loeb, S. , et al., “Information Filtering”,Communications of the ACM, 35, (Dec. 1992),26-28.
Merenbloom, P. , “Network ‘Fire Walls’ Safeguard LAN Data from Outside Intrusion”,Infoworld, (Jul. 25, 1994),p. 69 & addnl page.
Metzger, P. , et al., “IP Authenti

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for controlling access to documents stored... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for controlling access to documents stored..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for controlling access to documents stored... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4149142

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.