×

Enterprise security management system using hierarchical organization and multiple ownership structure

  • US 8,126,920 B2
  • Filed: 11/18/2004
  • Issued: 02/28/2012
  • Est. Priority Date: 07/02/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising the steps of:

  • a) providing at least one table of network resource access rules and access privileges, by assigning a user identifier and password to a network user;

    assigning a group identifier to the network user;

    specifying a parent group identifier for the group assigned to the network user, the parent group identifier identifying a parent group containing one or more superior network users;

    storing the user identifier, password, and group identifier information for the network user in a network user descriptor table;

    storing the group identifier and parent group identifier information in a group descriptor table for each group in the enterprise; and

    establishing a hierarchical relationship in the group descriptor table among the groups based on the group and parent group identifier information such that members of a parent group inherit all access rights and privileges of at least the child group, and grandchild group, if any;

    (b) making a network resource with a label available on the network;

    (c) upon request for access to the network resource by the network user, determining whether the network user should be granted access to the network resource by comparing the network user identification data with the at least one table of access rules and access privileges including the network user'"'"'s inherited access rights and privileges under a relevant sub-tree of the hierarchy of groups, and with the network resource label;

    (d) when access to the network resource is granted to the network user, determining which privileges the network user is given relative to the network resource in response to the access request by comparing the network user identification data with the at least one table of access rules and access privileges including the network user'"'"'s inherited access rights and privileges under a relevant sub-tree of the hierarchy of groups, and with the network resource label; and

    ,(e) providing the network user qualified in step (c) with the requested network resource according to the access privileges determined in the privilege determining step(d).

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×