Methods, system, and article for displaying privilege state data
First Claim
1. A method comprising the steps of:
- a) on a user interface of a terminal device generating a display of privilege state data in an array of cells in a three-dimensional view on a terminal device, the privilege state data of the cells displayed in correspondence with privilege labels, object labels, and user labels arranged along respective transverse axes of the three-dimensional view;
b) with the user interface of the terminal device, a user inputting privilege state data into at least one cell of the array using at least one privilege label, object label, and user label;
c) determining the privilege data, object data, and user data corresponding to the cell in which the privilege state data is input in the step (b);
d) storing the privilege state data in a memory in correspondence with respective privilege data, object data, and user data determined in step (c) for the cell in which the privilege state data was input in the step (b); and
e) updating the display to include a privilege state symbol corresponding to the privilege state data input by the user in the step (b), based on the privilege state data stored in the memory in the step (d).
6 Assignments
0 Petitions
Accused Products
Abstract
A method of the invention comprises generating a display of privilege state data for a network system in a three-dimensional view. The privilege state data can include graphical symbols indicating “on”, “inherited on”, “public on”, “off”, “not set”, and “disabled” states. The display can include at least one privilege label, object label, and user label arranged along respective axes of the three-dimensional view. The privilege state data can be displayed one or more cells arranged in association with respective privilege label(s), object label(s), and user label(s). The privilege label identifies at least one privilege, the object label identifies at least one object associated with the privilege, and the user label identifies at least one user or group of users associated with the object. The privilege labels can identify data access, data view, and data flow privileges to access or transfer data pertaining to the object within or without the network system. The privilege labels can also identify use privileges to use one or more software components. The object labels can identify one or more data objects stored in a database accessible by the network system, or one or more software components. The user labels can identify at least one user and/or user group. The invention also includes additional methods, a network system, and an article of manufacture.
-
Citations
7 Claims
-
1. A method comprising the steps of:
-
a) on a user interface of a terminal device generating a display of privilege state data in an array of cells in a three-dimensional view on a terminal device, the privilege state data of the cells displayed in correspondence with privilege labels, object labels, and user labels arranged along respective transverse axes of the three-dimensional view;
b) with the user interface of the terminal device, a user inputting privilege state data into at least one cell of the array using at least one privilege label, object label, and user label;
c) determining the privilege data, object data, and user data corresponding to the cell in which the privilege state data is input in the step (b);
d) storing the privilege state data in a memory in correspondence with respective privilege data, object data, and user data determined in step (c) for the cell in which the privilege state data was input in the step (b); and
e) updating the display to include a privilege state symbol corresponding to the privilege state data input by the user in the step (b), based on the privilege state data stored in the memory in the step (d). - View Dependent Claims (2, 3, 4, 5, 6, 7)
f) with the user interface of the terminal device, selecting at least one of the privilege labels, object labels, or user labels; and
g) modifying the display of the privilege state data by removing or adding cells to the three-dimensional view, based on the step (f).
-
-
5. A method as claimed in claim 1 wherein the user data identifies first and second user entities related by predetermined hierarchical relationship data and the privilege state data is input in the step (b) in at least one cell corresponding to first user entity, the method further characterized by the steps of:
-
f) determining whether the second user entity inherits privilege state data from the first user entity, based on the hierarchical relationship data; and
g) if the determination in the step (f) establishes that the second user entity inherits the privilege state data from the first user entity, storing the privilege state data input in the step (b) in correspondence with the user data for the second entity and the object data and privilege data for which the privilege state data was input in the step (b).
-
-
6. A method as claimed in claim 1 wherein the user data identifies dependencies between first and second object data related by predetermined dependency data, the method further characterized by the steps of:
-
f) determining whether the second object data inherits privilege state data from the from the first object data, based on the predetermined dependency data; and
g) if the determination in the step (f) establishes that the second object data inherits privilege state data from the first object data, storing the privilege state data input in the step (b) in correspondence with the user data for the second entity and the object data and privilege data for which the privilege state data was input in the step (b).
-
-
7. A method as claimed in claim 1 wherein the user data identifies dependencies between first and second privilege data related by predetermined dependency data, the method further characterized by the steps of:
-
f) determining whether the second privilege data inherits privilege state data from the from the first privilege data, based on the predetermined dependency data; and
g) if the determination in the step (f) establishes that the second privilege data inherits privilege state data from the first privilege data, storing the privilege state data input in the step (b) in correspondence with the user data for the second entity and the object data and privilege data for which the privilege state data was input in the step (b).
-
Specification