Method for gradual deployment of user-access security within a d

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

710240, G06F 1100

Patent

active

059918799

ABSTRACT:
A method allowing the gradual deployment of a new security policy on a data processing system wherein users may access certain objects under the former authorization until complete security implementation is achieved. A user having a security profile satisfying the former security policy criteria, but not the new security criteria, would normally be denied access to objects that were formerly accessible. With the present invention, an intermediate security profile is created while the new policy is being implemented wherein such a user's access is not granted, but not necessarily denied. This tertiary state is achieved by supplementing the security profile of the user to satisfy the new security criteria. When a user attempts object access providing an identity token valid under the former system, arbitration occurs which may result in the synthesis or substitution of a proxy identity which is compliant with the new policy. Alternatively, the tertiary state is achieved by supplementing the security profile of the object. In such a case, when a user attempts object access providing an identity token valid under the former system, arbitration occurs resulting in the amendment of the object's access criteria to allow access under the former security criteria. The security administrator may be notified of the attempted use and subsequent security arbitration results.

REFERENCES:
patent: 5111504 (1992-05-01), Esserman et al.
patent: 5481720 (1996-01-01), Loucks et al.
patent: 5696898 (1997-12-01), Baker et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for gradual deployment of user-access security within a d does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for gradual deployment of user-access security within a d, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for gradual deployment of user-access security within a d will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1235369

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.