Movatterモバイル変換


[0]ホーム

URL:


US20080256628A1 - Security Objects Controlling Access To Resources - Google Patents

Security Objects Controlling Access To Resources
Download PDF

Info

Publication number
US20080256628A1
US20080256628A1US11/764,829US76482907AUS2008256628A1US 20080256628 A1US20080256628 A1US 20080256628A1US 76482907 AUS76482907 AUS 76482907AUS 2008256628 A1US2008256628 A1US 2008256628A1
Authority
US
United States
Prior art keywords
security
resource
access
security object
control data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/764,829
Inventor
Maria Azua Himmel
Herman Rodriguez
Newton James Smith, Jr.
Clifford Jay Spinac
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US11/764,829priorityCriticalpatent/US20080256628A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATIONreassignmentINTERNATIONAL BUSINESS MACHINES CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HIMMEL, MARIA A, RODRIGUEZ, HERMAN, SMITH, NEWTON J, JR, SPINAC, CLIFFORD J
Publication of US20080256628A1publicationCriticalpatent/US20080256628A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Controlling access to resources through use of security objects including creating a security object in dependence upon user-selected security control data types, the security object comprising security control data and at least one security method; receiving a request for access to the resource; receiving security request data; and determining access to the resource in dependence upon the security control data and the security request data. Creating a security object includes storing in the security object a resource identification for the resource; storing in the security object an authorization level of access for the resource; storing in the security object user-selected security control data types; and storing in the security object security control data for each user-selected security control data type. Embodiments include deploying the security object on a security server or on a client device.

Description

Claims (37)

US11/764,8292002-06-242007-06-19Security Objects Controlling Access To ResourcesAbandonedUS20080256628A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US11/764,829US20080256628A1 (en)2002-06-242007-06-19Security Objects Controlling Access To Resources

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US10/179,328US7441264B2 (en)2002-06-242002-06-24Security objects controlling access to resources
US11/764,829US20080256628A1 (en)2002-06-242007-06-19Security Objects Controlling Access To Resources

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/179,328ContinuationUS7441264B2 (en)2002-06-242002-06-24Security objects controlling access to resources

Publications (1)

Publication NumberPublication Date
US20080256628A1true US20080256628A1 (en)2008-10-16

Family

ID=29734882

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US10/179,328Expired - Fee RelatedUS7441264B2 (en)2002-06-242002-06-24Security objects controlling access to resources
US11/764,829AbandonedUS20080256628A1 (en)2002-06-242007-06-19Security Objects Controlling Access To Resources
US12/141,430Expired - Fee RelatedUS7577986B2 (en)2002-06-242008-06-18Security objects controlling access to resources

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/179,328Expired - Fee RelatedUS7441264B2 (en)2002-06-242002-06-24Security objects controlling access to resources

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/141,430Expired - Fee RelatedUS7577986B2 (en)2002-06-242008-06-18Security objects controlling access to resources

Country Status (1)

CountryLink
US (3)US7441264B2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090006416A1 (en)*2007-06-272009-01-01Concept Solutions, Llc.Methods and systems for providing Web applications
US20110153696A1 (en)*2009-12-182011-06-23Anurekh SaxenaData Storage Aggregation on a Mobile Device
US8898746B2 (en)1997-06-112014-11-25Prism Technologies LlcMethod for managing access to protected computer resources
CN109492692A (en)*2018-11-072019-03-19北京知道创宇信息技术有限公司A kind of webpage back door detection method, device, electronic equipment and storage medium

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040025007A1 (en)*2002-07-302004-02-05Sreekrishna KotnurRestricting access to a method in a component
US7526347B2 (en)*2003-02-182009-04-28Fisher-Rosemount Systems, Inc.Security for objects in a process plant configuration system
US20090288147A1 (en)*2004-02-022009-11-19Michael YeungSystem and method for modifying security functions of an associated document processing device
US7503067B2 (en)*2004-02-022009-03-10Toshiba CorporationPreset security levels
US7634803B2 (en)*2004-06-302009-12-15International Business Machines CorporationMethod and apparatus for identifying purpose and behavior of run time security objects using an extensible token framework
US20060005234A1 (en)*2004-06-302006-01-05International Business Machines CorporationMethod and apparatus for handling custom token propagation without Java serialization
US8307291B2 (en)*2004-08-112012-11-06American Express Travel Related Services Company, Inc.Web page security system and method
US7890598B2 (en)*2005-03-312011-02-15Sony CorporationRemote access management
US7770174B1 (en)*2005-06-132010-08-03Sprint Spectrum L.P.Client-based resource manager with network-based rights acquisition
US7624432B2 (en)*2005-06-282009-11-24International Business Machines CorporationSecurity and authorization in management agents
EP2122531B1 (en)2007-01-192014-10-01BlackBerry LimitedSelectively wiping a remote device
NO326590B1 (en)*2007-04-162009-01-19Kubekit As Procedure and device for verification of information access in ICT systems with multiple security dimensions and security levels.
US20090157686A1 (en)*2007-12-132009-06-18Oracle International CorporationMethod and apparatus for efficiently caching a system-wide access control list
US8620666B1 (en)*2009-08-072013-12-31West CorporationSystem, method, and computer-readable medium that facilitate voice biometrics user authentication
US20110239270A1 (en)*2010-03-262011-09-29Nokia CorporationMethod and apparatus for providing heterogeneous security management
KR101788598B1 (en)*2010-09-012017-11-15엘지전자 주식회사Mobile terminal and information security setting method thereof
US8799269B2 (en)2012-01-032014-08-05International Business Machines CorporationOptimizing map/reduce searches by using synthetic events
US9347254B2 (en)*2012-05-042016-05-24The Chamberlain Group, Inc.Command priority levels for an access controller apparatus
US8903813B2 (en)2012-07-022014-12-02International Business Machines CorporationContext-based electronic document search using a synthetic event
US9460200B2 (en)2012-07-022016-10-04International Business Machines CorporationActivity recommendation based on a context-based electronic files search
US8898165B2 (en)2012-07-022014-11-25International Business Machines CorporationIdentification of null sets in a context-based electronic document search
US9262499B2 (en)2012-08-082016-02-16International Business Machines CorporationContext-based graphical database
US8676857B1 (en)2012-08-232014-03-18International Business Machines CorporationContext-based search for a data store related to a graph node
US8959119B2 (en)2012-08-272015-02-17International Business Machines CorporationContext-based graph-relational intersect derived database
US9619580B2 (en)2012-09-112017-04-11International Business Machines CorporationGeneration of synthetic context objects
US9251237B2 (en)2012-09-112016-02-02International Business Machines CorporationUser-specific synthetic context object matching
US8620958B1 (en)2012-09-112013-12-31International Business Machines CorporationDimensionally constrained synthetic context objects database
US9223846B2 (en)2012-09-182015-12-29International Business Machines CorporationContext-based navigation through a database
US8782777B2 (en)2012-09-272014-07-15International Business Machines CorporationUse of synthetic context-based objects to secure data stores
US9741138B2 (en)2012-10-102017-08-22International Business Machines CorporationNode cluster relationships in a graph database
US8931109B2 (en)2012-11-192015-01-06International Business Machines CorporationContext-based security screening for accessing data
US8983981B2 (en)2013-01-022015-03-17International Business Machines CorporationConformed dimensional and context-based data gravity wells
US9229932B2 (en)2013-01-022016-01-05International Business Machines CorporationConformed dimensional data gravity wells
US8914413B2 (en)2013-01-022014-12-16International Business Machines CorporationContext-based data gravity wells
US9053102B2 (en)2013-01-312015-06-09International Business Machines CorporationGeneration of synthetic context frameworks for dimensionally constrained hierarchical synthetic context-based objects
US8856946B2 (en)2013-01-312014-10-07International Business Machines CorporationSecurity filter for context-based data gravity wells
US9069752B2 (en)2013-01-312015-06-30International Business Machines CorporationMeasuring and displaying facets in context-based conformed dimensional data gravity wells
US9110722B2 (en)2013-02-282015-08-18International Business Machines CorporationData processing work allocation
US9292506B2 (en)2013-02-282016-03-22International Business Machines CorporationDynamic generation of demonstrative aids for a meeting
US10152526B2 (en)2013-04-112018-12-11International Business Machines CorporationGeneration of synthetic context objects using bounded context objects
US9195608B2 (en)2013-05-172015-11-24International Business Machines CorporationStored data analysis
US9348794B2 (en)2013-05-172016-05-24International Business Machines CorporationPopulation of context-based data gravity wells
US9697240B2 (en)2013-10-112017-07-04International Business Machines CorporationContextual state of changed data structures
EP2955899A1 (en)*2014-06-132015-12-16OrangeMethod and apparatus to regulate a digital security system that controls access to a resource
CN106846586A (en)*2016-06-282017-06-13袁博琦A kind of article transmits safely control method and system
CN107872446B (en)*2016-09-282020-07-24腾讯科技(深圳)有限公司Communication account management method and device and server
US10924467B2 (en)*2016-11-042021-02-16Microsoft Technology Licensing, LlcDelegated authorization for isolated collections
US10514854B2 (en)2016-11-042019-12-24Microsoft Technology Licensing, LlcConditional authorization for isolated collections
CA3071616A1 (en)2017-08-012019-02-07The Chamberlain Group, Inc.System for facilitating access to a secured area
US11055942B2 (en)2017-08-012021-07-06The Chamberlain Group, Inc.System and method for facilitating access to a secured area
US11165883B2 (en)*2019-01-022021-11-02Bank Of America CorporationEntry point classification of requests requiring access to data
US11017117B2 (en)2019-01-022021-05-25Bank Of America CorporationPre-firewall data classification
CN109874099B (en)*2019-01-282020-11-03行目数据科技有限公司Networking vehicle-mounted equipment flow control system
US12417276B2 (en)2023-09-202025-09-16International Business Machines CorporationRobotic process automation based password management

Citations (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US691041A (en)*1898-06-301902-01-14Josef Bruno ZuraMechanism for admitting or shutting off steam for rotary motors.
US5335346A (en)*1989-05-151994-08-02International Business Machines CorporationAccess control policies for an object oriented database, including access control lists which span across object boundaries
US5365574A (en)*1990-05-151994-11-15Vcs Industries, Inc.Telephone network voice recognition and verification using selectively-adjustable signal thresholds
US5592553A (en)*1993-07-301997-01-07International Business Machines CorporationAuthentication system using one-time passwords
US5606663A (en)*1993-12-241997-02-25Nec CorporationPassword updating system to vary the password updating intervals according to access frequency
US5619571A (en)*1995-06-011997-04-08Sandstrom; Brent B.Method for securely storing electronic records
US5752244A (en)*1996-07-151998-05-12Andersen Consulting LlpComputerized multimedia asset management system
US5787427A (en)*1996-01-031998-07-28International Business Machines CorporationInformation handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies
US5913025A (en)*1996-11-141999-06-15Novell, Inc.Method and apparatus for proxy authentication
US5922073A (en)*1996-01-101999-07-13Canon Kabushiki KaishaSystem and method for controlling access to subject data using location data associated with the subject data and a requesting device
US5991879A (en)*1997-10-231999-11-23Bull Hn Information Systems Inc.Method for gradual deployment of user-access security within a data processing system
US5994825A (en)*1996-07-221999-11-30Koito Manufacturing Co., Ltd.Electric lamp with a base
US6029247A (en)*1996-12-092000-02-22Novell, Inc.Method and apparatus for transmitting secured data
US6073242A (en)*1998-03-192000-06-06Agorics, Inc.Electronic authority server
US6105072A (en)*1993-08-102000-08-15Fischer; Addison M.Method and apparatus for validating travelling object-oriented programs with digital signatures
US6107935A (en)*1998-02-112000-08-22International Business Machines CorporationSystems and methods for access filtering employing relaxed recognition constraints
US6158010A (en)*1998-10-282000-12-05Crosslogix, Inc.System and method for maintaining security in a distributed computer network
US6173404B1 (en)*1998-02-242001-01-09Microsoft CorporationSoftware object security mechanism
US6192405B1 (en)*1998-01-232001-02-20Novell, Inc.Method and apparatus for acquiring authorized access to resources in a distributed system
US6275941B1 (en)*1997-03-282001-08-14Hiatchi, Ltd.Security management method for network system
US20020007461A1 (en)*1998-09-032002-01-17Greg B. GarrisonSystem and method for restricting unauthorized access to a database
US20020032873A1 (en)*2000-09-142002-03-14Lordemann David A.Method and system for protecting objects distributed over a network
US20020157016A1 (en)*2001-04-192002-10-24Russell Lance W.Data security for distributed file systems
US6609198B1 (en)*1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5107935A (en)*1990-06-081992-04-28Marvin Richard TeabyStake setting accessory for jack hammer
US5806296A (en)*1995-05-261998-09-15Bridgestone Metalpha CorporationCorrosion resistant spiral steel filament and steel cord made therefrom
JPH1091266A (en)1996-09-191998-04-10Nec Eng LtdPassword card and information processor using the same
US5944825A (en)1997-05-301999-08-31Oracle CorporationSecurity and password mechanisms in a database system
US7093122B1 (en)1999-01-222006-08-15Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces
AU4040500A (en)1999-04-022000-10-23Powerware CorporationApparatus, methods and computer program products for secure distributed data processing using user-specific service access managers and propagated security identifications
US6910041B2 (en)*2001-08-232005-06-21International Business Machines CorporationAuthorization model for administration

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US691041A (en)*1898-06-301902-01-14Josef Bruno ZuraMechanism for admitting or shutting off steam for rotary motors.
US5335346A (en)*1989-05-151994-08-02International Business Machines CorporationAccess control policies for an object oriented database, including access control lists which span across object boundaries
US5365574A (en)*1990-05-151994-11-15Vcs Industries, Inc.Telephone network voice recognition and verification using selectively-adjustable signal thresholds
US5592553A (en)*1993-07-301997-01-07International Business Machines CorporationAuthentication system using one-time passwords
US5661807A (en)*1993-07-301997-08-26International Business Machines CorporationAuthentication system using one-time passwords
US6105072A (en)*1993-08-102000-08-15Fischer; Addison M.Method and apparatus for validating travelling object-oriented programs with digital signatures
US5606663A (en)*1993-12-241997-02-25Nec CorporationPassword updating system to vary the password updating intervals according to access frequency
US5619571A (en)*1995-06-011997-04-08Sandstrom; Brent B.Method for securely storing electronic records
US5787427A (en)*1996-01-031998-07-28International Business Machines CorporationInformation handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies
US5922073A (en)*1996-01-101999-07-13Canon Kabushiki KaishaSystem and method for controlling access to subject data using location data associated with the subject data and a requesting device
US5752244A (en)*1996-07-151998-05-12Andersen Consulting LlpComputerized multimedia asset management system
US5994825A (en)*1996-07-221999-11-30Koito Manufacturing Co., Ltd.Electric lamp with a base
US5913025A (en)*1996-11-141999-06-15Novell, Inc.Method and apparatus for proxy authentication
US6029247A (en)*1996-12-092000-02-22Novell, Inc.Method and apparatus for transmitting secured data
US6275941B1 (en)*1997-03-282001-08-14Hiatchi, Ltd.Security management method for network system
US5991879A (en)*1997-10-231999-11-23Bull Hn Information Systems Inc.Method for gradual deployment of user-access security within a data processing system
US6192405B1 (en)*1998-01-232001-02-20Novell, Inc.Method and apparatus for acquiring authorized access to resources in a distributed system
US6107935A (en)*1998-02-112000-08-22International Business Machines CorporationSystems and methods for access filtering employing relaxed recognition constraints
US6173404B1 (en)*1998-02-242001-01-09Microsoft CorporationSoftware object security mechanism
US6073242A (en)*1998-03-192000-06-06Agorics, Inc.Electronic authority server
US20020007461A1 (en)*1998-09-032002-01-17Greg B. GarrisonSystem and method for restricting unauthorized access to a database
US6158010A (en)*1998-10-282000-12-05Crosslogix, Inc.System and method for maintaining security in a distributed computer network
US6609198B1 (en)*1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US20020032873A1 (en)*2000-09-142002-03-14Lordemann David A.Method and system for protecting objects distributed over a network
US20020157016A1 (en)*2001-04-192002-10-24Russell Lance W.Data security for distributed file systems

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8898746B2 (en)1997-06-112014-11-25Prism Technologies LlcMethod for managing access to protected computer resources
US9369469B2 (en)1997-06-112016-06-14Prism Technologies, L.L.C.Method for managing access to protected computer resources
US9413768B1 (en)1997-06-112016-08-09Prism Technologies LlcMethod for managing access to protected computer resources
US9544314B2 (en)1997-06-112017-01-10Prism Technologies LlcMethod for managing access to protected computer resources
US20090006416A1 (en)*2007-06-272009-01-01Concept Solutions, Llc.Methods and systems for providing Web applications
US8082294B2 (en)*2007-06-272011-12-20Concept Solutions, LlcMethods and systems for providing web applications
US8924470B2 (en)2007-06-272014-12-30Concept Solutions, LlcMethods and systems for providing web applications
US20110153696A1 (en)*2009-12-182011-06-23Anurekh SaxenaData Storage Aggregation on a Mobile Device
CN109492692A (en)*2018-11-072019-03-19北京知道创宇信息技术有限公司A kind of webpage back door detection method, device, electronic equipment and storage medium

Also Published As

Publication numberPublication date
US20080244697A1 (en)2008-10-02
US7441264B2 (en)2008-10-21
US7577986B2 (en)2009-08-18
US20030237006A1 (en)2003-12-25

Similar Documents

PublicationPublication DateTitle
US7577986B2 (en)Security objects controlling access to resources
US6311269B2 (en)Trusted services broker for web page fine-grained security labeling
US5742759A (en)Method and system for facilitating access control to system resources in a distributed computer system
US9807097B1 (en)System for managing access to protected resources
Rubin et al.Mobile code security
US20040054790A1 (en)Management of security objects controlling access to resources
US20040123146A1 (en)Security objects with language translation and speech to text conversion
US6438600B1 (en)Securely sharing log-in credentials among trusted browser-based applications
US8132226B1 (en)System, method and computer program product for an authentication management infrastructure
US20030105978A1 (en)Filter-based attribute value access control
US20070006325A1 (en)Method, system and computer program for controlling access to resources in web applications
US20030033535A1 (en)Method and system for implementing a common user logon to multiple applications
US20030236979A1 (en)Group security objects and concurrent multi-user security objects
US20040054931A1 (en)Calendar based security object management
WO2000069110A1 (en)Method and apparatus for authenticating users
US20020080200A1 (en)Method and apparatus for implementing a web application
WO2003036481A1 (en)System and method for rule-based entitlements
US20040123112A1 (en)Security object providing encryption scheme and key
US20040064724A1 (en)Knowledge-based control of security objects
US20030236996A1 (en)Security objects controlling timed access to resources
EP1649339B1 (en)System and method for providing java server page security
US20040054896A1 (en)Event driven security objects
CA2310535A1 (en)Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system
US20040123105A1 (en)Security object with CPU attributes
US20040141616A1 (en)Security object with encrypted, spread spectrum data communications

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HIMMEL, MARIA A;RODRIGUEZ, HERMAN;SMITH, NEWTON J, JR;AND OTHERS;REEL/FRAME:021274/0548

Effective date:20020621

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION


[8]ページ先頭

©2009-2025 Movatter.jp