×

Methods and systems for synchronizing security descriptors in systems that use multiple security descriptor specifications

  • US 6,895,512 B1
  • Filed: 06/30/2000
  • Issued: 05/17/2005
  • Est. Priority Date: 06/30/2000
  • Status: Active Grant
First Claim
Patent Images

1. In a security heterogenic computer network supporting different security descriptor specifications, the computer network having one or more devices that use a first security descriptor that follows a first security descriptor specification to describe security permissions related to a particular object, the computer network also having one or more devices that use a second security descriptor that follows a second security descriptor specification to describe security permissions related to that same particular object, a method of replicating in a non-degenerative fashion the first security descriptor with the second security descriptor specification, the method facilitating the synchronization of the first and second security descriptor specifications so that both security specifications may be used in the computer network, the method comprising the following:

  • a step for converting the first security descriptor into a version of the first security descriptor that follows the second security descriptor specification;

    a step for comparing the converted version of the first security descriptor that follows the second security descriptor specification with the second security descriptor;

    an act of changing the second security descriptor to reflect at least one security permission change as represented in the converted version of the first security descriptor so that any changes to the second security descriptor are non-degenerative and reversible;

    an act of undoing the at least one security permission change in the second security descriptor;

    a step for converting the second security descriptor into a version of the second security descriptor that follows the first security descriptor specification;

    a step for comparing the converted version of the second security descriptor that follows the first security descriptor specification with the first security descriptor; and

    an act of changing the first security descriptor to reflect the undone permission change as represented in the converted version of the second security descriptor so that any change to the first security descriptor is non-degenerative and reversible.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×