×

Flexibly assigning security configurations to applications

  • US 8,230,478 B2
  • Filed: 08/27/2009
  • Issued: 07/24/2012
  • Est. Priority Date: 08/27/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for assigning a security configuration to an application, the computer implemented method comprising:

  • determining, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration, the application executing in a data processing system using a processor and a memory;

    determining, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration;

    creating a set of maps, a map in the set of maps including a combination of (i) mapping of an application identifier to a first security configuration from a plurality of security configurations, (ii) mapping of a group identifier to a second security configuration in the plurality of security configurations, and (iii) default mapping to a third security configuration in the plurality of security configurations;

    using a map from the plurality of maps in making the first and the second determinations, the security configuration being a member of the plurality of security configurations;

    assigning, forming a first assignment, the security configuration to the application responsive to either of the first and the second determinations being true, data of the first assignment being recorded in a data storage associated with the data processing system; and

    assigning, forming a second assignment, the security configuration to the application using a determination by a first policy responsive to the first and the second determinations being false, data of the second assignment being recorded in the data storage associated with the data processing system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×