×

Technique for efficiently evaluating a security policy

  • US 8,584,196 B2
  • Filed: 05/05/2008
  • Issued: 11/12/2013
  • Est. Priority Date: 05/05/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-executed method for efficiently evaluating a security policy, comprising:

  • starting a session for a user;

    identifying a first role associated with the user;

    determining that a cached entry specific to the user does not exist in a session-level cache, wherein the cached entry corresponds to a set of access control entries (ACEs) that is in compliance with the first role;

    a first set of ACEs associated with the first role for the user from an access control list (ACL); and

    storing the generated first set of ACEs as the cached entry in the session-level cache, by storing a grant bit vector that indicates privileges granted to the first role and a deny bit vector that indicates privileges denied to the first role, wherein a grant bit in the grant bit vector and a corresponding deny bit in the deny bit vector jointly indicate whether an associated privilege is granted,denied, or undetermined, and wherein when the associated privilege is undetermined, the corresponding grant bit and deny bit are both “

    1”

    or “

    0;



    associating the user with a second role;

    generating a second set of ACEs based on the second role; and

    updating the session-level cache by storing the second set of ACEs;

    wherein associating the user with the second role comprises at least on of;

    allowing a system administrator change the first role, having a process temporarily enable the second role, and having the first role expire because of a time limit.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×