Providing secure access for multiple processes having separate directories
First Claim
1. In a computer system having an operating system where users are assigned specific user IDs and where access to the computer system is controlled by a security system of the operating system that checks the validity of a password entered for a specific user ID, a method of providing secure access to subsequent processes or resources on the computer system without further challenging the user ID through the use of other password, comprising the steps of:
- validating the identity of a user through the security system of the operating system by a security check requiring a user to enter a user ID and password, such that when the security check is complete the operating system allows said user entry onto the system and associates said user ID with said user;
requesting access, by said user, to a subsequent resource or process on the computer using a second user identifier having a format specific to said subsequent resource or process; and
performing a security check with out recourse to other passwords by determining if said user has privilege to access said subsequent resource or process by,obtaining said User ID and determining whether said user ID can act as said second user identifier,and if said user ID can act as said second user identifier, then granting access to subsequent resource or process,and if not then denying access to said subsequent resource or process.
2 Assignments
0 Petitions
Accused Products
Abstract
A variety of processes, e.g., electronic mail, word processing, database applications, etc., reside on a system, e.g., an operating system. Independent levels of security are maintained for the different processes without requiring the user to pass a security test to gain access to each process. The system includes a directory of system identifiers assigned to users. Each process includes a directory of process-specific identifiers for users of that process. The system identifiers and process identifiers are associated in a predetermined manner. Therefore, a user may gain access to a process only when the user'"'"'s system identifier is associated with the desired process-specific identifier.
67 Citations
14 Claims
-
1. In a computer system having an operating system where users are assigned specific user IDs and where access to the computer system is controlled by a security system of the operating system that checks the validity of a password entered for a specific user ID, a method of providing secure access to subsequent processes or resources on the computer system without further challenging the user ID through the use of other password, comprising the steps of:
-
validating the identity of a user through the security system of the operating system by a security check requiring a user to enter a user ID and password, such that when the security check is complete the operating system allows said user entry onto the system and associates said user ID with said user; requesting access, by said user, to a subsequent resource or process on the computer using a second user identifier having a format specific to said subsequent resource or process; and performing a security check with out recourse to other passwords by determining if said user has privilege to access said subsequent resource or process by, obtaining said User ID and determining whether said user ID can act as said second user identifier, and if said user ID can act as said second user identifier, then granting access to subsequent resource or process, and if not then denying access to said subsequent resource or process. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. In a computer system having an operating system where users are assigned specific user IDs and where access to the computer system is controlled by a security system of the operating system that checks the validity of a password entered for a specific user ID, as an article of manufacture, a computer program system without further challenging the user ID through processes or resources on the computer system without further challenging the user ID through the use of other passwords comprising:
-
computer readable medium having computer executable instructions embodied thereon comprising; means for validating the identity of a user through the security system of the operating system by a security check requiring a user to enter a user ID and password, such that when the security check is complete, the operating system allows said user entry onto the system and associates said user ID with said user; means for requesting access, by said user to a subsequent resource or process on the computer using a second user identifier having a format specific to said subsequent resource or process; and means for performing a security check without recourse to other passwords by determining if said user has privilege to access said subsequent resource or process by, obtaining said user ID and determining whether said user ID can act as said second user identifier, and if said user ID) can act as said second user identifier, then granting access to said subsequent resource or process, and if not, then denying access to said subsequent resource or process. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification