Method and system of applying user permissions to an application program environment
First Claim
1. A method for determining user access to an application program environment comprising:
- (a) parsing the entire application program to determine a description of user permission requirements;
(b) providing a document containing the description of user permission requirements based on the parsing;
(c) producing a schema that models a class structure of the description of user permission requirements based on the document; and
(d) determining user access based on a comparison of a predetermined user'"'"'s permission and the permission requirements in the class structure.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention relates to a method and system of applying a user'"'"'s permission status to an entire application program environment comprising: parsing the entire application program to determine a description of user permission requirements for individual functions, and providing a respective descriptive document. A schema is then produced that models a class structure of the description of user permission requirements based on the descriptive document. The user permissions are applied in accordance with the results of a comparison of a predetermined user'"'"'s permission and the permission requirements in the class structure.
20 Citations
14 Claims
-
1. A method for determining user access to an application program environment comprising:
-
(a) parsing the entire application program to determine a description of user permission requirements;
(b) providing a document containing the description of user permission requirements based on the parsing;
(c) producing a schema that models a class structure of the description of user permission requirements based on the document; and
(d) determining user access based on a comparison of a predetermined user'"'"'s permission and the permission requirements in the class structure. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for applying user permissions to an application program environment comprising:
-
(a) parsing the entire application program to determine a description of user permission requirements;
(b) providing a document containing the description of user permission requirements based on the parsing of the program application;
(c) producing a schema that models a class structure of the description of user permission requirements based on the document;
(d) creating a proxy application that is called prior to launching the application program environment;
(e) retrieving a user'"'"'s predetermined permission set;
(f) applying the user'"'"'s predetermined permission set to the schema to produce a user'"'"'s permission schema;
(g) launching the application program environment;
(h) applying the user'"'"'s permissions by loading the user'"'"'s permission schema in to the application program environment. - View Dependent Claims (7)
-
-
8. A system comprising logic stored on a computer readable medium, operable to:
-
(a) parse the entire application program to determine a description of user permission requirements;
(b) provide a document containing the description of user permission requirements based on the parsing;
(c) produce a schema that models a class structure of the description of user permission requirements based on the document; and
(d) determine user access based on a comparison of a predetermined user'"'"'s permission and the permission requirements in the class structure. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system comprising logic stored on a computer readable medium, operable to:
-
(a) parse the entire application program to determine a description of user permission requirements;
(b) provide a document containing the description of user permission requirements based on the parsing of the program application;
(c) produce a schema that models a class structure of the description of user permission requirements based on the document;
(d) create a proxy application that is called prior to launching the application program environment;
(e) retrieve a user'"'"'s predetermined permission set;
(f) apply the user'"'"'s predetermined permission set to the schema to produce a user'"'"'s permission schema;
(g) launch the application program environment;
(h) apply the user'"'"'s permissions by loading the user'"'"'s permission schema in to the application program environment. - View Dependent Claims (14)
-
Specification