Managing access with resource control lists and resource replication
First Claim
1. In a computerized environment in which one or more computer systems communicate secure and non-secure information, a method of managing resources such that resource access can be easily identified and shared between computer systems in a secure manner, comprising the acts of:
- receiving a request from an accessor for access to one or more resources;
identifying an accessor object for the accessor;
identifying a resource control list;
identifying that at least one of the requested one or more resources is associated with an allow classification in the resource control list; and
sending a message indicating that the identified at least one of the requested one or more resources is accessible.
2 Assignments
0 Petitions
Accused Products
Abstract
Resources in a computerized environment can be organized into objects and resource groups, which are, in turn, managed by one or more resource control lists. For example, a computer system (i.e., an accessor) can be represented by an object at a managing computer system. The computer system object includes a resource control list that indicates what groups of objects can be accessed, and/or what groups of objects cannot be accessed. A request by the computer system for a resource, such as a user object, can involve the managing computer system identifying the computer system object, reviewing the resource control list for the computer system object, and then reviewing whether the requested resource is found in an accessible group. Additional implementations relate to ensuring that resources are accessed appropriately, such as at a point when all resource updates have been sent, received, and implemented for the given resource.
106 Citations
20 Claims
-
1. In a computerized environment in which one or more computer systems communicate secure and non-secure information, a method of managing resources such that resource access can be easily identified and shared between computer systems in a secure manner, comprising the acts of:
-
receiving a request from an accessor for access to one or more resources;
identifying an accessor object for the accessor;
identifying a resource control list;
identifying that at least one of the requested one or more resources is associated with an allow classification in the resource control list; and
sending a message indicating that the identified at least one of the requested one or more resources is accessible. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. In a computerized environment in which one or more computer systems communicate secure and non-secure information, a method of correlating updates to one or more resources between computer systems in a simple and secure manner, comprising the acts of:
-
receiving an indicator that a resource has been updated at an originating computer system;
receiving one or more components of a corresponding resource update from the originating computer system;
sending one or more responses, before all of the one or more components have been received, that the resource is unavailable;
updating the resource after all of the one or more components have been received; and
responding to a new request for the resource in accordance with the updated resource. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. In a computerized environment in which one or more computer systems communicate secure and non-secure information, a computer program product having computer-executable instructions stored thereon that, when executed, cause one or more processors at a computer system to perform a method comprising the following:
-
receiving an indicator that a resource has been updated at an originating computer system;
receiving one or more components of a corresponding resource update from the originating computer system;
sending one or more responses, before all of the one or more components have been received, that the resource is unavailable;
updating the resource after all of the one or more components have been received; and
responding to a new request for the resource in accordance with the updated resource.
-
Specification