×

Access control policy engine controlling access to resource based on any of multiple received types of security tokens

  • US 7,774,830 B2
  • Filed: 03/14/2005
  • Issued: 08/10/2010
  • Est. Priority Date: 03/14/2005
  • Status: Active Grant
First Claim
Patent Images

1. A processor implemented method in connection with a requestor submitting a request to access a digital resource, the request including at least one security token associated with the requestor, each security token of the request containing access decision information useful for determining whether to allow the request, each security token having one of a plurality of types, the method for an access control policy engine associated with the resource to determine whether to allow the request, the method comprising the access control policy engine:

  • receiving at the processor the request with each security token thereof;

    retrieving each security token from the request;

    processing by the processor each retrieved security token by;

    determining the type of such retrieved security token;

    mapping the access decision information in the retrieved security token to a common format, wherein the common format comprises at least one security claim setting forth a right of the requestor, and wherein the access control policy engine maps the access decision information in the retrieved security token to the common format as at least one security claim setting forth adequate information to determine a right of the requestor as;

    P a principal identifier that identifies the requestor;

    R a right possessed by P with respect to a target T and expressing a relationship between P and T;

    T a target identifier that identifies the target of a right;

    C any condition on R with respect to T that the access control policy engine is to evaluate; and

    I an issuer identifier that identifies an entity that issued the security token and conferred R with respect to T on P,the access control policy engine having a set of security claims relating to the request after having processed the retrieved security tokens;

    retrieving a set of rules for accessing the resource;

    applying the retrieved set of rules for accessing the resource to the set of security claims to determine whether to allow the request from the requestor; and

    if the request from the requestor is to be allowed, providing the requestor access to the resource in accordance with the request and the rights of the requestor as set forth within the set of security claims.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×