System and method for role based dynamic configuration of...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C345S215000, C345S215000, C713S001000, C713S166000, C713S152000

Reexamination Certificate

active

06785822

ABSTRACT:

BACKGROUND OF THE INVENTION
1. Technical Field
The present invention relates to information processing technology. More particularly, the present invention relates to the configuration of profiles based on roles.
2. Description of Related Art
Throughout the business environment, software applications directed toward service and support operations are being bundled into suites of management solutions. These comprehensive software solutions maximize the efficiency and effectiveness of a corporate service and support operation. A typical suite may consist of several integrated applications that help manage functions that are critical to an organization's infrastructure. By deploying such a suite to optimize the relationship between IT (information technology) and its internal customers, an enterprise is better able to understand and manage the complex relationships between user problems, network events, corporate assets, and changes to the IT infrastructure.
System integrity and security are always concerns for corporations. System integrity is threatened when users without the needed training or skill level gain access to sophisticated processes and system components. A person having less than the necessary competence can easily disrupt an entire system by unknowingly reconfiguring critical system components. System security is threatened when an unauthorized person gains access to sophisticated processes and system components. An unauthorized person could sabotage an entire system, reconfiguring and/or deleting critical system components. Equally important, an unauthorized person could gain access to privileged information.
It would be advantageous to provide a means for reducing the access of unauthorized users to critical system functions. It would further be advantageous to provide a means for allowing access to authorized persons to critical system functions. It would be even more advantageous to provide means to reduce access of system functions to some users while allowing other users more access to system functions.
SUMMARY OF THE INVENTION
The present invention relates to a system and method for configuring profiles that grant functionality. The grant of functionality allows the system administrator to increase system security by limiting access to functionality from specific groups or users. Initially, profiles are customized by naming and assignment to individual users and identifiable groups of users. A profile is further assigned action groups that comprise one or more system actions. System actions provide the functionality needed for toolbar buttons and menu items. Using the system actions associated with the action groups, toolbar buttons and menus can then be configured for the profile. The profile determines the level of functionality downloaded with the application. When a request is received for an application, the user's profile is accessed for the action groups and system actions that provide functionality for the application. Only system actions associated with a profile to which the user is assigned are transferred to the requesting user. Alternatively, the user's group profile may be accessed for the action groups and system actions that provide functionality for the application. If no profile is available for the user or the user's group, a default profile may be accessed for the action groups and system actions.


REFERENCES:
patent: 5001628 (1991-03-01), Johnson et al.
patent: 5113442 (1992-05-01), Moir
patent: 5560008 (1996-09-01), Johnson et al.
patent: 5675782 (1997-10-01), Montague et al.
patent: 5720033 (1998-02-01), Deo
patent: 5764889 (1998-06-01), Ault et al.
patent: 5794001 (1998-08-01), Malone et al.
patent: 5881225 (1999-03-01), Worth
patent: 6101607 (2000-08-01), Bachand et al.
patent: 6356863 (2002-03-01), Sayle
patent: 6448981 (2002-09-01), Kaczmarski
patent: 6457130 (2002-09-01), Hitz et al.
patent: 6513111 (2003-01-01), Klimczak et al.
patent: 06-075913 (1994-03-01), None
patent: 07-182289 (1995-07-01), None
patent: 10-011398 (1998-01-01), None
Marc J. Rochkind, “Advanced UNIX Programming,” 1985, p. xii and pp. 4-12.*
Brian W. Kernighan et al., “The UNIX Programming Environment,” 1984, pp. 52-57.*
David James Clarke, IV, “Novell's LAN Study Guide IntranetWare/NetWare 4.11,” 1997, pp. 344-350, 371-388, 410-420.*
Andrew S. Tanenbaum, “Operating Systems: Design and Implementation,” 1987, pp. 284-297.*
System Administrator's Guide; Tivoli Service Desk 5.1; Chapter 3: Configuring Profiles; pp. 47-86, Jul. 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for role based dynamic configuration of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for role based dynamic configuration of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for role based dynamic configuration of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3322696

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.