×

Method for managing usage authorizations in a data processing network and a data processing network

  • US 8,365,263 B2
  • Filed: 12/30/2008
  • Issued: 01/29/2013
  • Est. Priority Date: 01/16/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for managing usage authorizations in a data processing network, comprising:

  • allocating at least one role stored in a central authorization register to a user, upon a portable identification object of the user being read wirelessly by a login read device to log the user in at a work station of the data processing network, such that the user can execute a number of applications and functions without a further identification process;

    determining, upon an application being called up and via a local security module of the application, authorizations granted for the allocated at least one role of the user;

    accessing via a central security module, when there is not sufficient authorization granted for an application-related action, a central collection of security rules indicating circumstances in which, when the granted authorizations are not sufficient to carry out the application-related action, the user can still carry out the application-related action;

    determining whether, according to at least one of the security rules, a usage authority is possible for the application-related action and conveying the possibility, when determined, to the user; and

    upon determining that there is not sufficient authorization granted to the allocated at least one role of the user with which the user is logged in to carry out the application-related action,determining that the user is allocated at least one further role in addition to the role with which the user is logged in,determining that the at least one further role has sufficient authorization to carry out the at least one application-related action,transferring the authorization of the at least one further role to carry out the application-related action to the role with which the user is logged in, andexecuting a security rule that allows the application-related action to be carried out without additional identification of the user,wherein when further identification of the user is necessary for the user to carry out the application-related action and more than one security rule permits execution of the application-related action, the central security module at least one of a) selects one security rule, b) displays a list of the security rules for user selection and c) proposes a security rule determined based on a prioritization.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×