Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2008-06-04
2010-10-26
Pardo, Thuy N (Department: 2627)
Data processing: database and file management or data structures
Database design
Data structure types
C707S781000, C707S794000, C707S688000, C707S690000
Reexamination Certificate
active
07822777
ABSTRACT:
Systems and methods for automating and increasing the efficiency of access to data using inheritance of access rules within an organization based upon the relationship of positions within the organization and the roles associated with the positions. In one embodiment, a role structure is used in conjunction with a hierarchical organization structure to allow access rules to be inherited by some of the positions from other positions based upon the relationship of positions within the organization and the roles associated with the positions. Access rules can be applied across equivalent or similar positions, yet differentiated between distinct portions of the organization and the distinct roles associated with the positions. Consequently, particular access rules are not necessarily inherited by all of the positions subordinate to a particular position with which the rule originates, and are not necessarily inherited by all of the positions that are associated with a particular role.
REFERENCES:
patent: 5379422 (1995-01-01), Antoshenkov
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 5953724 (1999-09-01), Lowry
patent: 6075851 (2000-06-01), Pinard et al.
patent: 6185576 (2001-02-01), McIntosh
patent: 6237036 (2001-05-01), Ueno et al.
patent: 2005/0203819 (2005-09-01), Rogers et al.
SAP Labs, Inc. “Authorizations Mde Easy: Generating Authorization Profiles” Release 4.5 A/B. 1999. Palo Alto, Ca.
Sandhu, Role-Based Access Control Models, IEEE Computer, Feb. 1996, pp. 38-44, vol. 29, No. 2.
Ferraiolo, Role-based Access Contol Model & Reference Implemention W/in a Corporate Intranet, ACM Transactions on Info. & Sys. Security, Feb. 1999, pp. 34-64, vol. 2, No. 1.
Sloman, Policy Based Management of Telecommunications Systems & Networks, http://www-dse.doc.ic.ac.uk/˜mss, Sep. 28-29, 1998.
The Ponder Policy Based Management Toolkit, http://www-dse.doc.ic.ac.uk/Research/Policies/index.shtml, Aug. 2002.
L. Bartz, LDAP Schema for Role Based Access Control, Internet Draft, Oct. 21, 1997.
Stokes, Access Control requirements for LDAP, Internet Draft, Feb. 16, 1998.
Stokes, Access Control requirements for LDAP, Internet Draft, Aug. 10, 1998.
Stokes, Access Control requirements for LDAP, Internet Draft, Jun. 25, 1999.
L. Bartz, hyperDRIVE: Leveraging LDAP to Implement RBAC on the Web, IRS, US Dept of Treasury, Indianapolis, IN, Oct. 21, 1997.
Stokes, Access Control requirements for LDAP, Internet Draft, May 2000.
Law Offices of Mark Berrier
Pardo Thuy N
LandOfFree
Systems and methods for rule inheritance does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for rule inheritance, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for rule inheritance will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4196321