Modeling technique for system access control and management
First Claim
Patent Images
1. A method of controlling system access comprising the steps of:
- providing a plurality of terminals for a plurality of users to access said system;
modeling said system in advance of any users accessing said system;
said modeling accepting as input parameters derived from said system to be accessed;
determining, in response to said step of modeling, which particular types of system access will result in degraded system performance; and
preventing such types of system access.
1 Assignment
0 Petitions
Accused Products
Abstract
An access and control system for use in a computer network provides for a rule making algorithm which models a database in advance and prevents queries which could result in exceptional processing requirements. As queries are entered during the life of the system, a learning algorithm updates the rules. The rules may be applied at the point of entry as well as the database.
187 Citations
25 Claims
-
1. A method of controlling system access comprising the steps of:
-
providing a plurality of terminals for a plurality of users to access said system; modeling said system in advance of any users accessing said system; said modeling accepting as input parameters derived from said system to be accessed; determining, in response to said step of modeling, which particular types of system access will result in degraded system performance; and preventing such types of system access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of controlling system access by using rules, the method comprising the steps of:
-
determining via a computerized induction process, properties of database queries which result in high resource utilization retrieving data from a database; generating, in response to said step of determining, a set of rules to prevent queries which have said properties; filtering said rules through a computer program to determine if any of said rules are inapplicable; and discarding in response to said filtering step at least one of said rules which requires that a query having said property should not be allowed.
-
-
12. A method of controlling system access comprising:
-
forming a set of rules which govern whether particular transactions in said system will or will notbe permitted; weighing rules depending upon system conditions, several of said rules potentially conflicting with each other; and applying a weighted average of the rules to determine if system access will be permitted. - View Dependent Claims (14)
-
-
13. A method of controlling access to a multi-user computer system comprising the steps of:
-
(a) modeling a database contained in said computer; (b) determining, from said step of modeling, database queries which will generate excessive loading; (c) ascertaining, after database queries which generate excessive loading are transacted, additional queries which generate excessive loading and which where not determined in step (b); and (d) controlling access to said system by rules based upon both said step of ascertaining and said step of determining. - View Dependent Claims (15)
-
-
16. A method of forming rules to govern and control data access to a database, said method comprising:
-
recording the occurrence of a first transaction at a first time; recording the occurrence of a second transaction at a second time; preventing specified future data accesses to said database if said first and second times have a predetermined relationship with each other with respect to time and substance.
-
-
17. A method of updating rules in a computer system, said computer system having a plurality of clients, said method comprising:
-
applying, at least one of said clients, rules to objects contained within said clients; collecting results of said applications at said at least one of said clients of said rules to said objects said results being organized into samples; updating rules based upon said samples; and applying said updated rules to said objects at each of said at least one of said clients. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification