×

Object security boundaries

  • US 6,606,711 B2
  • Filed: 10/29/2002
  • Issued: 08/12/2003
  • Est. Priority Date: 11/30/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of defining security of a server application comprising a plurality of objects having methods to access the objects'"'"' functionality, the method comprising the steps of:

  • at development of the server application, configuring security settings indicative of identities authorized to access the objects'"'"' methods, at least one of the methods for one of the objects having a different setting than another of the object'"'"'s methods, the security settings residing outside the objects;

    at deployment of the server to a host computer system, importing the security settings to a central store in the host computer system;

    at execution of the application on the host computer, responsive to a request of a client program, for access to a method of one of the objects, wherein the request is associated with an identity, checking the security settings in the central store to determine if the security settings indicate whether the associated identity is authorized to access the method, wherein the client program and the one object are executing in a same process; and

    if the security settings indicate the associated identity is not authorized to access the method, denying access of the client program to the method.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×