×

FINE-GRAINED AUTHORIZATION FRAMEWORK

  • US 20080256030A1
  • Filed: 04/11/2008
  • Published: 10/16/2008
  • Est. Priority Date: 04/12/2007
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for controlling access to an instance method on an instance-specific basis comprising the steps of:

  • (a) intercepting an invocation of the instance method, having an instance method invocation identification, on an instance, having instance identification;

    (b) determining a caller of the instance method invocation identification;

    (c) associating the caller with a caller access control cache on a computer readable medium, the caller access control cache having an instance segment including a set of the instance method invocation identifications, the caller access control cache having a grant segment including a grant set of the instance method invocation identifications, the caller access control cache having a deny segment including a deny set of the instance method invocation identifications, the caller access control cache having a high/low segment including a set of ranges for the instance method invocation identifications for each access control rule;

    (d) associating the caller access control cache with a transaction;

    (e) granting, to the caller, access to the instance invoked by the instance method having the instance method invocation identification if the instance method invocation identification matches one of the set, or if the instance method invocation identification matches one of the grant set;

    (f) adding the instance method invocation identification to the set and repeating steps (a) through (f) if the instance method invocation created a new instance;

    (g) denying, to the caller, access to the instance invoked by the instance method having the instance method invocation identification and repeating steps (a) through (g) if the instance method invocation identification matches one of the deny set;

    (h) adding the instance method invocation identification to the deny segment and repeating step (g) if there are no more of the instance access control rules associated with the instance invoked by the instance method having the instance method invocation identification;

    (i) repeating step (h) if the instance method invocation identification is within the high/low set for the instance access control rule or if the instance access control rule does not define a scope that matches the caller and an application context associated with the transaction;

    (j) determining additional of the instance methods with which the instance access control rule is associated if there are more of the instance access control rules associated with the instance, and if the instance method invocation identification is outside the high/low set for the instance access control rule, and if the instance access control rule defines the scope that matches the caller and the application context;

    (k) optimizing a query of the instance access control rule;

    (l) determining results from executing the optimized query of the instance access control rule;

    (m) storing the results and additional of the instance methods with which the instance access control rule is associated in the grant segment and the high/low segment of the caller access control cache in the computer readable medium;

    (n) granting, to the caller, access to the instance invoked by the instance method having the instance method invocation identification and repeating steps (a) through (f) if the instance method invocation identification matches an entry in the results; and

    (o) repeating steps (h)-(n) if the instance method invocation identification matches no entry in the results.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×