Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2005-02-02
2010-02-23
Wong, Don (Department: 2163)
Data processing: database and file management or data structures
Database design
Data structure types
C726S026000
Reexamination Certificate
active
07668862
ABSTRACT:
A system and method for controlling the use by caller objects to a restricted method of a resource object in an object-oriented computing environment are provided in accordance with one embodiment of the invention. The method is based on associating an access-token with a caller object which is to be allowed to access the restricted method and sharing this access-token with the resource object. When subsequent calls to the restricted method are made by a caller object, access is made contingent on the caller object providing the access-token as part of the call procedure. Where no access-token is provided, or an invalid access-token is provided, access to the method is denied or restricted. The method provides protection against innocently made wrong calls to a restricted method by a caller object, for example due to coding errors. The method also provides protection against maliciously made calls to a restricted method by caller objects that should not have access to it.
REFERENCES:
patent: 5852666 (1998-12-01), Miller et al.
patent: 6279111 (2001-08-01), Jensenworth et al.
patent: 6351817 (2002-02-01), Flyntz
patent: 6412070 (2002-06-01), Van Dyke et al.
patent: 6625603 (2003-09-01), Garg et al.
patent: 2002/0138727 (2002-09-01), Dutta et al.
patent: 2003/0097582 (2003-05-01), Audebert et al.
patent: 2003/0115487 (2003-06-01), Andrews et al.
patent: 2 308 688 (1997-07-01), None
Masashi, et al., “Role-Based Purpose-Oriented Access Control for Distributed Systems,” ′Online!, 1998, XP002296045, 3 pages.
Object Management Group, “Security Service Specification,” XP002296433, Version 1.8, Mar. 2002, Chapters 1, 2, 3.
Partha Dasgupta, et al., “Efficient and Secure Information Sharing in Distributed, Collaborative Environments,” XP002296434, Third International Workshop on Communication-Based Systems, Mar. 2000, 8 pages.
Keiji Izaki, et al., “Access Control Model in Object-Oriented Systems,” IEEE, 2000, Jul. 4, 2000, pp. 69-74.
European Search and Examination Report for Application No. 04252294.6-1243-, Oct. 1, 2004, 9 pages.
John Hale, et al., “A Ticket-Based Access Control Architecture for Object Systems,” IOS Press, 2000, 21 pages.
Communication Pursuant to Article 96(2) EPC, from foreign associate, dated Jul. 18, 2007.
Partha Dasgupta, et al., “Efficient and Secure Information Sharing in Distributed, Collaborative Environments,” Dept. of Computer Science and Engineering, Arizona State University, 2000.
Kowert Robert C.
Meyertons Hood Kivlin Kowert & Goetzel P.C.
Sun Microsystems Inc.
Wong Don
Xue Belinda
LandOfFree
System and method for controlling the use of a method in an... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for controlling the use of a method in an..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for controlling the use of a method in an... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4217326