Information security – Access control or authentication – Network
Reexamination Certificate
2007-10-16
2007-10-16
Zand, Kambiz (Department: 2134)
Information security
Access control or authentication
Network
C726S018000, C726S027000
Reexamination Certificate
active
10131659
ABSTRACT:
System and method for authorizing access to an entity by a user, by binding an access control list to each entity; specifying for the user a set of user privileges; intersecting the access control list and set of user privileges in a compiled ACL table; incrementally refreshing the compiled ACL table responsive to run time modification of relevant tables containing the access control list and set of user privileges; and referencing the compiled access control list to authorize a user request to access an entity.
REFERENCES:
patent: 5390312 (1995-02-01), Chiarot et al.
patent: 5495533 (1996-02-01), Linehan et al.
patent: 5552776 (1996-09-01), Wade et al.
patent: 5560005 (1996-09-01), Hoover et al.
patent: 5627987 (1997-05-01), Nozue et al.
patent: 5774668 (1998-06-01), Choquier et al.
patent: 5941947 (1999-08-01), Brown et al.
patent: 6014666 (2000-01-01), Helland et al.
patent: 6052785 (2000-04-01), Lin et al.
patent: 6105027 (2000-08-01), Schneider et al.
patent: 6141754 (2000-10-01), Choy
patent: 6161139 (2000-12-01), Win et al.
patent: 6195705 (2001-02-01), Leung
patent: 6256715 (2001-07-01), Hansen
patent: 6308173 (2001-10-01), Glasser et al.
patent: 6438549 (2002-08-01), Aldred et al.
patent: 6460171 (2002-10-01), Couvert et al.
patent: 6470353 (2002-10-01), Yaung et al.
patent: 6523027 (2003-02-01), Underwood
patent: 6581060 (2003-06-01), Choy
patent: 6609128 (2003-08-01), Underwood
patent: 6633878 (2003-10-01), Underwood
patent: 6718535 (2004-04-01), Underwood
patent: 6772350 (2004-08-01), Belani et al.
patent: 6823338 (2004-11-01), Byrne et al.
patent: 6823452 (2004-11-01), Doyle et al.
patent: 6976023 (2005-12-01), Chen et al.
patent: 2001/0037379 (2001-11-01), Livnat
patent: 2002/0002577 (2002-01-01), Garg et al.
patent: WO9940502 (1999-08-01), None
Dictionary.com, Retrieved online <URL:http://dictionary.reference.com/search?q=compile>, Compile, definition of.
Thesaurus.com,Refresh (Synonyms), pp. 1-4 <URL:http://thesaurus.reference.com/browse/refresh> retrieved online Jul. 27, 2006.
Dictionary.com, Refresh (Definition), pp. 1-3 <URL:http://dictionary.reference.com/browse/refresh> retrieved online Jul. 27, 2006.
Dictionary.com, Update (Definition), pp. 1-2 <URL:http://dictionary.reference.com/browse/update> retrieved online Jul. 27, 2006.
Dictionary.com, Incremental (Definition), pp. 1-2 <URL:http://dictionary.reference.com/browse/incremental> retrieved online Jul. 27, 2006.
Chan et al, “Incremental Update to Aggregated Information for Data Warehouses over Internet”, 2000, ACM, pp. 57-64.
IBM Content Manager for Multiplatforms System Administration Guide, Version 7.1. USA: IBM Corporation Doc. No. SC27-0868-00, First Edition (Jan. 2001). [Accessed Mar. 27, 2002 2:27 PM at http://www-4.ibm.com/software/data/cm/pubs/cm71/sysadm/frns2mst02.htm].
System and Method for RDBMS to Protect Records in Accordance with Non-RDBMS Rules. IBM Docket No. AM9-99-0207.
Okamoto, Tatsuaki.A Single Public-Key Authentication Scheme for Multiple Users. Systems and Computer in Japan, vol. 18, No. 10, 1987.
Sandhu et al. ‘NetWare 4 as an Example of Role-Based Access Control’. ACM Press, 1996. 12 pages.
Crall, Chris et al.Authorization in Enterprise-wide Distributed System A Practical Design and Application. Proceedings 14th Annual Computer Security Applications Conference. Los Alamitos, CA: IEEE Comput. Soc., 1998. 12 pages.
Kavaln, Vasanthi et al.A Mobile Agent for Asynchronous Administration of Multiple DBMS Servers. Proceedings of the IEEE Third International Workshop on systems Management. Los Alamitos, CA: IEEE Compt. Soc., 1998. 1-2.
Hayton, Richard et al.An Open Architecture for Secure Interworking Services. Proceedings of the 17th International Conference on Distributed Computing Systems. Los Alamitos, CA: IEEE Comput. Soc. Press, 1997. 315-321.
Han, Yan et al.Constraint Specification for Object Model of Access Control Based on Role. Software Engineering Notes, vol. 25, No. 2, Mar. 2000. USA: ACM. 60-64. [Inspec Abstract AN 6580279, ABN C2000-06-6130S-023].
IBM Corp.Content Manager for Multiplatforms. Wysiwyg://2/http://www-4.ibm.com/software/data/cm/cmgr/mp/about.html; and Wysiwyg://1/http://www-4.ibm.com/software/data/cm/cmgr/mp [accessed Mar. 26, 2002 5:13 PM].
Choy David Mun-Hien
Hu Tawei
Lin Jy-Jine James
Wang Yuping
Yaung Alan Tsu-I
Beckstrand Shelley M
International Business Machines - Corporation
Szymanski Thomas
Zand Kambiz
LandOfFree
System and method for incremental refresh of a compiled... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for incremental refresh of a compiled..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for incremental refresh of a compiled... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3901157