Information security – Policy
Reexamination Certificate
2004-12-23
2009-10-20
Pich, Ponnoreay (Department: 2435)
Information security
Policy
C709S223000, C709S225000
Reexamination Certificate
active
07607164
ABSTRACT:
A method for managing changes to policies in an enterprise includes receiving a systems policy change request to change a systems policy that implements a published enterprise policy, determining whether the requested systems policy change complies with the published enterprise policy, and updating the systems policy according to the requested systems policy change if the requested systems policy change complies with the published enterprise policy. A system for managing policies in an enterprise includes a policy management module configured for receiving published policies and generating corresponding systems policies having data for implementing the published policies, and a policy library storing the published policies and the systems policies.
REFERENCES:
patent: 5717911 (1998-02-01), Madrid et al.
patent: 5717924 (1998-02-01), Kawai
patent: 5881225 (1999-03-01), Worth
patent: 5889953 (1999-03-01), Thebaut et al.
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 6006328 (1999-12-01), Drake
patent: 6073242 (2000-06-01), Hardy et al.
patent: 6167445 (2000-12-01), Gai et al.
patent: 6192405 (2001-02-01), Bunnell
patent: 6334121 (2001-12-01), Primeaux et al.
patent: 6389589 (2002-05-01), Mishra et al.
patent: 6393473 (2002-05-01), Chu
patent: 6490680 (2002-12-01), Scheidt et al.
patent: 6523027 (2003-02-01), Underwood
patent: 6633878 (2003-10-01), Underwood
patent: 6751657 (2004-06-01), Zothner
patent: 6792462 (2004-09-01), Bernhardt et al.
patent: 7062537 (2006-06-01), Aziz et al.
patent: 7100195 (2006-08-01), Underwood
patent: 7171459 (2007-01-01), Sanghvi et al.
patent: 7185192 (2007-02-01), Kahn
patent: 7194631 (2007-03-01), Numano
patent: 7237191 (2007-06-01), Sulistio et al.
patent: 7240015 (2007-07-01), Karmouch et al.
patent: 7409447 (2008-08-01), Assadzadeh
patent: 7490073 (2009-02-01), Qureshi et al.
patent: 2001/0034733 (2001-10-01), Prompt et al.
patent: 2002/0147801 (2002-10-01), Gullotta et al.
patent: 2002/0184485 (2002-12-01), Dray et al.
patent: 2003/0115179 (2003-06-01), Prabakaran et al.
patent: 2003/0115322 (2003-06-01), Moriconi et al.
patent: 2004/0054565 (2004-03-01), Nemecek et al.
patent: 2004/0103073 (2004-05-01), Blake et al.
patent: 2004/0111643 (2004-06-01), Farmer
patent: 2004/0148299 (2004-07-01), Teegan et al.
patent: 2004/0204949 (2004-10-01), Shaji et al.
patent: 2004/0210662 (2004-10-01), Lim et al.
patent: 2005/0060342 (2005-03-01), Farag
patent: 2005/0071359 (2005-03-01), Elandassery et al.
patent: 2005/0086126 (2005-04-01), Patterson
patent: 2005/0091269 (2005-04-01), Gerber et al.
patent: 2005/0139649 (2005-06-01), Metcalf et al.
patent: 2005/0144019 (2005-06-01), Murakami et al.
patent: 2005/0149450 (2005-07-01), Stefik et al.
patent: 2005/0149552 (2005-07-01), Chan et al.
patent: 2005/0187957 (2005-08-01), Kramer et al.
patent: 2005/0278431 (2005-12-01), Goldschmidt et al.
patent: 2005/0289072 (2005-12-01), Sabharwal
patent: 2006/0031757 (2006-02-01), Vincent, III
patent: 2006/0048218 (2006-03-01), Lingafelt et al.
patent: 2006/0048236 (2006-03-01), Multerer et al.
patent: 2006/0059128 (2006-03-01), Ruggle et al.
patent: 2006/0107046 (2006-05-01), Raley et al.
patent: 2006/0129589 (2006-06-01), Thornton et al.
patent: 2006/0155725 (2006-07-01), Foster et al.
patent: 2007/0124797 (2007-05-01), Gupta et al.
Marriott et al, “Management Policy Service for Distributed Systems”, IEEE, 1996, pp. 2-9.
“Understanding Active Directory Replication”, 2000, pp. 171-179.
Velegrakis, et al., “Preserving Mapping Consistency Under Schema Changes”, Springer-Verlag, 2004, pp. 274-293.
Ferraiolo, et al, “A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet”, ACM Transactions on Information and System Security, vol. 2, No. 1, Feb. 1999, pp. 34-64.
Ferraiolo, et al, “Proposed NIST Standard for Role-Based Access Control”, ACM Transactions on Information and System Security, vol. 4, No. 3, Aug. 2001, pp. 224-274.
Sandhu, et al, “The NIST Model for Role-Based Access Control: Towards a Unified Standard”, pp. 1-17, publication year: 2000.
Schneider, “Enforceable Security Policies”, ACM Transactions on Information and System Security, vol. 3, No. 1, Feb. 2000, pp. 30-50.
Brown Laurie A.
Hunter Kimberley Ann
Lawrence Mark David
Leibmann Matthias
Vasishth Karan
Lee & Hayes PLLC
Microsoft Corporation
Pich Ponnoreay
LandOfFree
Systems and processes for managing policy change in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and processes for managing policy change in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and processes for managing policy change in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4095882