Authorizing a requesting entity to operate upon data structures

Information security – Access control or authentication – Authorization

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S008000, C726S009000, C726S018000, C726S019000, C726S020000, C726S028000, C726S029000

Reexamination Certificate

active

10003767

ABSTRACT:
Authorizing a requesting entity to have a service perform a particular action in a manner that is at least partially independent of the underlying target data structure. An authorization station maintains a number of role templates that each define basic access permissions with respect to a number of command methods. The authorization station also maintains a number of role definitions that each define access permissions for specific requesting entities by using one or more of the role templates. When the authorization station receives a request from the requesting entity, the authorization station then identifies the appropriate role definition. Using this role definition, the authorization station determines access permissions for the requesting entity with respect to the requested action.

REFERENCES:
patent: 5544302 (1996-08-01), Nguyen
patent: 5634129 (1997-05-01), Dickinson
patent: 5778227 (1998-07-01), Jordan
patent: 5787427 (1998-07-01), Benatar et al.
patent: 5872926 (1999-02-01), Levac et al.
patent: 5911143 (1999-06-01), Deinhart et al.
patent: 5933820 (1999-08-01), Beier et al.
patent: 5956715 (1999-09-01), Glasser et al.
patent: 5963976 (1999-10-01), Ogawa et al.
patent: 6023765 (2000-02-01), Kuhn
patent: 6044224 (2000-03-01), Radia et al.
patent: 6088675 (2000-07-01), MacKenty et al.
patent: 6092101 (2000-07-01), Birrell et al.
patent: 6148302 (2000-11-01), Beylin et al.
patent: 6154876 (2000-11-01), Haley et al.
patent: 6167402 (2000-12-01), Yeager
patent: 6189032 (2001-02-01), Susaki et al.
patent: 6192408 (2001-02-01), Vahalia et al.
patent: 6195662 (2001-02-01), Ellis et al.
patent: 6199081 (2001-03-01), Meyerzon et al.
patent: 6202066 (2001-03-01), Barkley et al.
patent: 6223207 (2001-04-01), Lucovsky
patent: 6282548 (2001-08-01), Burner et al.
patent: 6336118 (2002-01-01), Hammond
patent: 6336147 (2002-01-01), Brownell et al.
patent: 6343324 (2002-01-01), Hubis et al.
patent: 6349302 (2002-02-01), Aoyama et al.
patent: 6349307 (2002-02-01), Chen
patent: 6351744 (2002-02-01), Landresse
patent: 6351843 (2002-02-01), Berkley et al.
patent: 6356940 (2002-03-01), Short
patent: 6370537 (2002-04-01), Gilbert et al.
patent: 6377952 (2002-04-01), Inohara et al.
patent: 6490721 (2002-12-01), Gorshkov et al.
patent: 6519571 (2003-02-01), Guheen et al.
patent: 6542845 (2003-04-01), Grucci et al.
patent: 6553427 (2003-04-01), Chang et al.
patent: 6604209 (2003-08-01), Grucci et al.
patent: 6654747 (2003-11-01), Van Huben et al.
patent: 6678682 (2004-01-01), Jenkins et al.
patent: 6684204 (2004-01-01), Lal
patent: 6704024 (2004-03-01), Robotham
patent: 6711612 (2004-03-01), Blumenau et al.
patent: 6823458 (2004-11-01), Lee et al.
patent: 6832237 (2004-12-01), Christensen et al.
patent: 6907457 (2005-06-01), Merrell et al.
patent: 6917373 (2005-07-01), Vong et al.
patent: 7017016 (2006-03-01), Chujo
patent: 2001/0047385 (2001-11-01), Tuatini
patent: 2002/0029256 (2002-03-01), Zintel et al.
patent: 2002/0035533 (2002-03-01), Mache et al.
patent: 2002/0055951 (2002-05-01), Shigetomi et al.
patent: 2002/0133752 (2002-09-01), Hand
patent: 2003/0074423 (2003-04-01), Mayberry et al.
patent: 2004/0139145 (2004-07-01), Bar-or et al.
Chandramouli, Ramaswamy; “Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks”; ACM Press; 2000; pp. 11-18.
Vuong et al.; “Managing Security Policies in a Distributed Environment using XML”; ACM Press; 2001; pp. 405-411.
Vuong et al. ; “Managing Security Policies in a Distributed Environment Using eXtensible Markup Language (XML)”; Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), Mar. 11-14, 2001, Las Vegas, NV; pp. 405-411.
Stallings, William; Cryptography and Network Security; 1998; Prentice Hall, Inc.; Chapter 11.
Caswell, Deborah L., “An Evolution of DCE Authorization Services,”Hewlett-Packard Journal, vol. 46, No. 6, pp. 49-54, Dec. 1995.
Title: Security requirements for web-services; Author Jerbic, M. ; Report Title: Position papers for World Wide Web consortium (W3C) workshop on web services ; pp. 28-33 Issued by: Hewlett-Packard Lab., Bristol, UK ; Publication Date: 2001 Country of Publication: UK; 50 pp.
Title: A role-based access control model for XML repositories; Author Hao He; Wong, R.K. Conference Title: Proceedings of the First International Conference on Web Information Systems Engineering; Part vol. 1 p. 138-45 vol. 1 Publication Date: 2000; Country of Publication: USA; 2 vol.(xv+498+xvi+219); pp. ISBN: 0 7695 0577 5; Material Identity No. XX-2000-02089 Conference Title: Proceedings of WISE 2000: 1st International Conference on Web Information Systems Engineering; Conference Date: Jun. 19-21, 2000 Conference Location: Hong Kong, China.
Simple Object Access Protocol (SOAP) 1.1 W3C Note May 8, 2000 Don Box, DevelopMentor; David Ehnebuske, IBM; Gopal Kakivaya, Microsoft; Andrew Layman, Microsoft; Noah Mendelsohn, Lotus Development Corp.; Henrik Frystyk Nielsen, Microsoft; Satish Thatte Microsoft; Dave Winer, UserLand Software, Inc.
U.S. Appl. No. 60/275,809, filed Mar. 14, 2001, Lucovsky et al.
Simple Object Access Protocol (SOAP) 1.1 W3C Note May 8, 2000 Don Box, DevelopMentor; David Ehnebuske, IBM; Gopal Kakivaya, Microsoft Anderw Layman, Microsoft; Noah Mendelsohn, Lotus Development Corp,; Henrik Frystyk Nielsen, Microsoft Satish Thatte, Microsoft; Dave Winer, UserLande Software, Inc. pp. 1-35. (Herein after referred to as Article 1.).
Barish, Greg; Untangling the Web; Intelligent Enterprise; Mar. 27, 2001; pp. 38-43. (Herein after referred to as Article 2.).
Dix, Ghris; Working With Soap, The Simple Object Access Protocol;C/C++ Users Journal; Jan. 2002; pp. 22-33. (Herein after referred to as Article 3.).
Jepsen, Tom; Soap Cleans up Interoperability Problems on the Web;IT Pro; Jan.-Feb. 2001; pp. 52-55. (Herein after referred to as Article 4.).
X Marks the Path; JNJ Online; http://www.dnjonline.com/articles/essentials/iss25—essentials—xpath.asp;Jan. 3, 2002; 6 pgs. (Herein after referred to as Article 5.).
Soap Version 1.2 Part 1: Messaging Framework; http://www.w3.org/TR/2002/WD-soap12-part1-20011002; Nov. 30, 2001; 33 pgs. (Herein after referred to as Article 6.).
Soap Version 1.2 Part 2: Adjuncts; http://www.w3.org/TR/2001/WD-soap12-part2-20011002; Oct. 30, 2001; 43 pgs. (Herein after referred to as Article 7.).
WML Path Language (Xpath) Version 1.0; http://www.w3.org/TR/1999/REC-xpath-19991116;Oct. 30, 2001; 35 pgs. (Herein after referred to as Article 8.).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authorizing a requesting entity to operate upon data structures does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authorizing a requesting entity to operate upon data structures, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authorizing a requesting entity to operate upon data structures will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3860133

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.