×

Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles

  • US 5,263,157 A
  • Filed: 02/15/1990
  • Issued: 11/16/1993
  • Est. Priority Date: 02/15/1990
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method of providing user access control for a plurality of resource objects within a distributed data processing system having at least one reference monitor service and a plurality of resource managers associated with said plurality of resource objects, each of said plurality of resource managers controlling access to different selected ones of said resource objects, each of said resource managers associated with a reference monitor service, said method comprising the computer implemented steps of:

  • storing a plurality of unique access control profiles within each said reference monitor service, wherein selected ones of said plurality of access control profiles each include access control information relating to a predetermined set of said resource objects and a selected list of users each authorized to access at least a portion of said predetermined set of resource objects;

    querying an associated reference monitor service by a selected one of said resource managers in response to an attempted access of a particular resource object among said plurality of resource objects, wherein access to said particular resource object is controlled by said selected resource manager;

    transmitting a selected access control profile associated with said particular resource object from said associated reference monitor service to said selected one of said resource managers if said selected access control profile existed in said associated reference monitor service;

    if not, attempting to retrieve said selected access control profile from another said reference monitor service and thereafter transmitting said retrieved access control profile to said selected one of said resource managers;

    utilizing said selected resource manager to control access to said particular resource object in accordance with access control information in said selected access control profile; and

    denying access to said particular resource object in response to a failure to retrieve said selected access control profile.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×