Information security – Policy
Reexamination Certificate
2011-06-28
2011-06-28
Pich, Ponnoreay (Department: 2435)
Information security
Policy
C713S164000, C713S165000, C707S694000, C707S781000, C707S785000, C707S786000
Reexamination Certificate
active
07971230
ABSTRACT:
The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.
REFERENCES:
patent: 5987506 (1999-11-01), Carter et al.
patent: 6148377 (2000-11-01), Carter et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6233576 (2001-05-01), Lewis
patent: 6321334 (2001-11-01), Jerger et al.
patent: 6345361 (2002-02-01), Jerger et al.
patent: 6347376 (2002-02-01), Attwood et al.
patent: 6466932 (2002-10-01), Dennis et al.
patent: 6498612 (2002-12-01), Brown et al.
patent: 6574736 (2003-06-01), Andres
patent: 6772350 (2004-08-01), Belani et al.
patent: 7120698 (2006-10-01), Krishnapuram et al.
patent: 7133914 (2006-11-01), Holbrook
patent: 7478418 (2009-01-01), Supramaniam et al.
patent: 2002/0152226 (2002-10-01), Burnett
patent: 2003/0084256 (2003-05-01), McKee
patent: 2003/0105771 (2003-06-01), Tiefenbrun et al.
patent: 2003/0188198 (2003-10-01), Holdsworth et al.
patent: 2003/0217033 (2003-11-01), Sandler et al.
patent: 2003131919 (2003-05-01), None
patent: 2006-536577 (2010-11-01), None
Office Action dated Apr. 8, 2005 cited in U.S. Appl. No. 10/691,999.
Office Action dated Aug. 10, 2005 cited in U.S. Appl. No. 10/691,999.
Office Action dated Mar. 9, 2006 cited in U.S. Appl. No. 10/691,999.
Office Action dated Nov. 17, 2006 cited in U.S. Appl. No. 10/691,999.
Notice of Allowance dated May 3, 2007 cited in U.S. Appl. No. 10/691,999.
Brian Johnson. International Search Report. Apr. 26, 2005. 3 pages.
Laurence Cholvy, et al., Analyzing Consistency of Security Policies, 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, pp. 1-9, Oakland, CA.
Tetsuya Yokoyama, “File System, Digest Preview,” Windows, Net Server World, pp. 132-137, IDC Japan, Japan, Jan. 1, 2003.
Kohei Okamura in Internet Security Systems, Inc., “Chapter 7: Access Control Model,” Microsoft Windows 2000 Security Technical Reference, 1stEd., pp. 217-242, NIKKEI BP Softpress Apr. 2, 2001.
Bruce Greenblatt, “Chapter 10: ADS and NDS of Microsoft,” Internet Directories How to Build and Manage Applications for LDAP, DNS, and Other Directories, 1stEd., pp. 263-272, Pearson Education Japan, Japan, Mar. 25, 2001.
Agarwal Sameet H.
Anand Sanjay
Leach Paul J.
Raman Balan Sethu
Ward Richard B.
Microsoft Corporation
Pich Ponnoreay
Workman Nydegger
LandOfFree
System and methods providing enhanced security model does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and methods providing enhanced security model, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and methods providing enhanced security model will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2713698