Techniques for eliminating redundant access checking by access f

Data processing: database and file management or data structures – Database design – Data structure types

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

707 10, 709201, 709205, 709217, 709225, 709229, G06F 15163

Patent

active

06105027&

ABSTRACT:
A scalable access filter that is used together with others like it in a virtual private network to control access by users at clients in the network to information resources provided by servers in the network. Each access filter uses a local copy of an access control data base to determine whether an access request is made by a user. Changes made by administrators in the local copies are propagated to all of the other local copies. Each user belongs to one or more user groups and each information resource belongs to one or more information sets. Access is permitted or denied according to of access policies which define access in terms of the user groups and information sets. The rights of administrators are similarly determined by administrative policies. Access is further permitted only if the trust levels of a mode of identification of the user and of the path in the network by which the access is made are sufficient for the sensitivity level of the information resource. If necessary, the access filter automatically encrypts the request with an encryption method whose trust level is sufficient. The first access filter in the path performs the access check and encrypts and authenticates the request; the other access filters in the path do not repeat the access check.

REFERENCES:
patent: 4919545 (1990-04-01), Yu
patent: 4961224 (1990-10-01), Yung
patent: 5249230 (1993-09-01), Mihm, Jr.
patent: 5442342 (1995-08-01), Kung
patent: 5455953 (1995-10-01), Russell
patent: 5568613 (1996-10-01), Futral
patent: 5696898 (1997-12-01), Baker et al.
patent: 5706427 (1998-01-01), Tabuki
patent: 5758083 (1998-05-01), Singh et al.
patent: 5771291 (1998-06-01), Newton et al.
patent: 5774650 (1998-06-01), Chapman et al.
patent: 5828832 (1998-10-01), Holden et al.
patent: 5828833 (1998-10-01), Belville et al.
patent: 5841970 (1998-11-01), Tabuki
patent: 5951649 (1999-09-01), Dobbins et al.
patent: 5987611 (1999-11-01), Freund
Che-fun Yu, Access control and authorization plan for customer control of network services, in: IEEE Global Telecommunications Conference and exhibition, Conference Record, vol. 2, pp. 862-869, Nov. 27, 1989.
CheckPoint FireWall-1.TM. White Paper, Version 2.0--Jun. 1995. http://www.integralis.co.uk/checkpnt/firewall/white, pp. 1-21, Anonymous.
Checkpoint FireWall-1, http://www.metadigm.co.uk/fw1/. 1996 Metadigm Ltd., pp. 1-7, Anonimous.
Commercial Firewalls and Related FW Products, http://hp735c.csc.cuhk.hk/firewall.html. Mar. 23, 1996, p 1-12.
Five Domains of Network Security, Technical Overview of the Eagle, http://www.raptor.com/...T22NZ.Z56DAM.BF3AQD.F2, Jan. 30, 1997.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Techniques for eliminating redundant access checking by access f does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Techniques for eliminating redundant access checking by access f, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Techniques for eliminating redundant access checking by access f will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2018265

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.