System and method for securing network resources
First Claim
Patent Images
1. A method of securing access to an element of a network comprising:
- associating the element with a set of data; and
configuring a portion of the data to be responsive to a first subset of access rights.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for securing access to network resources are described. One embodiment includes an exemplary method for securing access to a network element and can include associating a network element with a set of data, and configuring a portion of the data to be responsive to a first subset of access rights. In accordance with other embodiments, an exemplary method and system provide for selection of an appropriate security to govern access by a user to network resources.
-
Citations
38 Claims
-
1. A method of securing access to an element of a network comprising:
-
associating the element with a set of data; and
configuring a portion of the data to be responsive to a first subset of access rights. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
22. A method of selecting an appropriate security set of securing an access to a network element comprising:
-
discovering one or more security sets, each security set including a specific access right relevant to the access to the network element;
identifying at least two of the one or more security sets where the specific access right is in conflict;
determining whether each of the at least two security sets are associated with two or more groups; and
resolving the conflict between the at least two security sets. - View Dependent Claims (23, 24, 25)
-
-
34. A system for securing an access to a network element comprising:
-
a security set repository configured to store one or more security sets, where a security set subset of the one or more security sets relate to a specific access right relevant to the access requested by a user, and further configured to maintain a hierarchical data structure having at least one node associated with at least one of the security set subset;
a directory configured to store one or more configuration records, where at least one configuration record is associated with the at least one node; and
a security manager configured to select an appropriate security set to govern a request of the user to access the at least one configuration record. - View Dependent Claims (35, 36, 37, 38)
-
Specification