×

Server impersonation of client processes in an object based computer operating system

  • US 5,187,790 A
  • Filed: 04/21/1992
  • Issued: 02/16/1993
  • Est. Priority Date: 06/29/1989
  • Status: Expired due to Term
First Claim
Patent Images

1. In a computer system, havingmemory means for storing data and data structures;

  • a multiplicity of objects comprising data structures stored in said memory means;

    each of a multiplicity of said objects having an associated access control list for limiting access to said each object, each access control list including a list of entries, wherein each entry includes a conjunction of one or more identifiers required to access said each object; and

    a multiplicity of processes running concurrently on said computer system;

    said processes including at least one server process and plurality of client processes;

    each of said processes having an associated identifier list denoting a set of identifiers;

    a method of operating said computer system comprising the steps of;

    one of said at least one server process responding to requests by one of said plurality of client processes by performing tasks on behalf of the requesting client process;

    said one server process impersonating said requesting client process by adopting a set of identifiers to replace said identifier list associated with said one server process, wherein said adopted set of identifiers is said identifiers in the identifier list associated with said requesting client process when said one server process is responding to a first request by said requesting client process, and wherein said adopted set of identifiers is the union of said identifiers in said identifier list associated with said requesting client process and said identifiers in said identifier list associated with said one server process when said one server process is responding to a second request by said requesting client process; and

    said one server process initiating access to a specified one of said multiplicity of objects, said system enabling access by said one server process to said one specified object when said adopted set of identifiers match the identifiers of at least one entry in said one specified object'"'"'s access control list.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×