System and method for incremental refresh of a compiled access control table in a content management system
First Claim
Patent Images
1. Method for authorizing access to an entity by a user, comprising:
- binding an access control list to each said entity;
specifying for said user a set of user privileges;
intersecting said access control list and said set of user privileges in a compiled ACL table;
incrementally refreshing said compiled ACL table responsive to run time modification of said access control list or set of user privileges.
3 Assignments
0 Petitions
Accused Products
Abstract
System and method for authorizing access to an entity by a user, by binding an access control list to each entity; specifying for the user a set of user privileges; intersecting the access control list and set of user privileges in a compiled ACL table; incrementally refreshing the compiled ACL table responsive to run time modification of relevant tables containing the access control list and set of user privileges; and referencing the compiled access control list to authorize a user request to access an entity.
55 Citations
25 Claims
-
1. Method for authorizing access to an entity by a user, comprising:
-
binding an access control list to each said entity;
specifying for said user a set of user privileges;
intersecting said access control list and said set of user privileges in a compiled ACL table;
incrementally refreshing said compiled ACL table responsive to run time modification of said access control list or set of user privileges. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. System for authorizing access to an entity by a user, comprising:
-
an access control list bound to said entity;
a set of user privileges;
a compiled access control list (ACL) table;
a content manager for intersecting said access control list and said set of user privileges in said compiled ACL table, and for incrementally refreshing said compiled ACL table responsive to run time modification of said access control list or said set of user privileges. - View Dependent Claims (21, 22)
-
-
23. A program storage device readable by a machine, tangibly embodying a program of instructions executable by a machine to perform a method for authorizing access to an entity by a user, comprising:
-
binding an access control list to each said entity;
specifying for said user a set of user privileges;
intersecting said access control list and said set of user privileges in a compiled ACL table;
incrementally refreshing said compiled ACL table responsive to run time modification of said access control list or set of user privileges. - View Dependent Claims (24, 25)
-
Specification