Systems and methods for rule inheritance

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S781000, C707S794000, C707S688000, C707S690000

Reexamination Certificate

active

07822777

ABSTRACT:
Systems and methods for automating and increasing the efficiency of access to data using inheritance of access rules within an organization based upon the relationship of positions within the organization and the roles associated with the positions. In one embodiment, a role structure is used in conjunction with a hierarchical organization structure to allow access rules to be inherited by some of the positions from other positions based upon the relationship of positions within the organization and the roles associated with the positions. Access rules can be applied across equivalent or similar positions, yet differentiated between distinct portions of the organization and the distinct roles associated with the positions. Consequently, particular access rules are not necessarily inherited by all of the positions subordinate to a particular position with which the rule originates, and are not necessarily inherited by all of the positions that are associated with a particular role.

REFERENCES:
patent: 5379422 (1995-01-01), Antoshenkov
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 5953724 (1999-09-01), Lowry
patent: 6075851 (2000-06-01), Pinard et al.
patent: 6185576 (2001-02-01), McIntosh
patent: 6237036 (2001-05-01), Ueno et al.
patent: 2005/0203819 (2005-09-01), Rogers et al.
SAP Labs, Inc. “Authorizations Mde Easy: Generating Authorization Profiles” Release 4.5 A/B. 1999. Palo Alto, Ca.
Sandhu, Role-Based Access Control Models, IEEE Computer, Feb. 1996, pp. 38-44, vol. 29, No. 2.
Ferraiolo, Role-based Access Contol Model & Reference Implemention W/in a Corporate Intranet, ACM Transactions on Info. & Sys. Security, Feb. 1999, pp. 34-64, vol. 2, No. 1.
Sloman, Policy Based Management of Telecommunications Systems & Networks, http://www-dse.doc.ic.ac.uk/˜mss, Sep. 28-29, 1998.
The Ponder Policy Based Management Toolkit, http://www-dse.doc.ic.ac.uk/Research/Policies/index.shtml, Aug. 2002.
L. Bartz, LDAP Schema for Role Based Access Control, Internet Draft, Oct. 21, 1997.
Stokes, Access Control requirements for LDAP, Internet Draft, Feb. 16, 1998.
Stokes, Access Control requirements for LDAP, Internet Draft, Aug. 10, 1998.
Stokes, Access Control requirements for LDAP, Internet Draft, Jun. 25, 1999.
L. Bartz, hyperDRIVE: Leveraging LDAP to Implement RBAC on the Web, IRS, US Dept of Treasury, Indianapolis, IN, Oct. 21, 1997.
Stokes, Access Control requirements for LDAP, Internet Draft, May 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for rule inheritance does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for rule inheritance, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for rule inheritance will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4196321

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.