System and method for provisioning resources to users based...

Electrical computers and digital processing systems: multicomput – Computer network managing – Network resource allocating

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S223000, C709S229000, C713S152000, C379S201120

Reexamination Certificate

active

06947989

ABSTRACT:
A method for provisioning users with resources is disclosed. The method includes the steps of establishing a set of attributes, organizational information, and user roles, and defining a plurality of resource provisioning policies based on selected attributes and user roles. The method also includes the steps of receiving attribute information, organizational information, and user role information for a particular user or resource, determining which resource access policies are applicable to the user based on the received user role information and attribute information, and provisioning the user with resources based on the applicable resource access policies. The resources to be provisioned include “hard” resources, such as telephones, computers, personal digital assistants, desks, chairs and the like, as well as “soft” resources. such as e-mail and voice mail accounts, application programs, databases, files, folders, the like.

REFERENCES:
patent: 5826239 (1998-10-01), Du et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6052723 (2000-04-01), Ginn
patent: 6055637 (2000-04-01), Hudson et al.
patent: 6067548 (2000-05-01), Cheng
patent: 6085191 (2000-07-01), Fisher et al.
patent: 6088679 (2000-07-01), Barkley
patent: 6182142 (2001-01-01), Win et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6237036 (2001-05-01), Ueno et al.
patent: 6408336 (2002-06-01), Schneider et al.
patent: 2002/0156904 (2002-10-01), Gullotta et al.
patent: 2002/0169876 (2002-11-01), Curie et al.
patent: 0697662 (1996-02-01), None
Hitchens et al, “Design and Specification of Role Based Access Control Policies”, IEEE, Aug. 2000.
Tari et al, “A Role-based Access Control for Intranet Security”, IEEE, 1997.
David Ferraiolo and Richard Kuhn, Role-Based Access Controls, Proceedings of the 15thNIST-NSA National Computer Security Conference, Baltimore, Maryland, Oct. 13-16, 1992.
NIST High Integrity Software Systems Assurance Webstie with link to NIST Research in Role Based Access Control http://hissa.nist.gov.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for provisioning resources to users based... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for provisioning resources to users based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for provisioning resources to users based... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3411468

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.