×

Method and apparatus for securing information access

  • US 7,043,553 B2
  • Filed: 10/07/1999
  • Issued: 05/09/2006
  • Est. Priority Date: 10/07/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. An apparatus for controlling operations by a client on a file stored on a network device, said apparatus comprising:

  • a first memory associated with the file, said first memory for storing a fixed file security status, said fixed file security status being either of a first type or of a second type, wherein said first type indicates that operations are not allowed on the file and said second type indicates that operations are allowed on the file;

    a second memory associated with the file, said second memory for storing an active file security status, said active file security status being either of said first type or of said second type and changeable from said first type to said second type;

    an independent verification routine having access to a security database listing clients and corresponding privileges, wherein said independent verification routine is enabled;

    to determine whether the client has privilege to perform operations on the file based at least in part on an authorization credential from the client andto generate either a positive or a negative determination upon request; and

    a request handler in communication with said first memory, said second memory, and said independent verification routine, wherein said request handler is enabled;

    to receive a request from the client to open the file;

    to transmit a file descriptor to the client;

    to copy said fixed file security status from said first memory to said second memory as said active file security status;

    to determine whether said active file security status is of said first type or of said second type;

    when said active file security status is determined to be of said second type;

    to receive a request from the client to perform an operation on the file;

    to determine that said active file security status is of said second type; and

    to perform the operation requested by the client on the file;

    andwhen said active file security status is determined to be of said first type;

    to receive said authorization credential from the client;

    to pass said authorization credential to said independent verification routine;

    to receive a positive determination from said independent verification routine that the client has privilege to perform operations on the file;

    to change said active file security status from said first type to said second type;

    to receive a request from the client to perform an operation on the file;

    to determine that said active file security status is of said second type; and

    to perform the operation requested by the client on the file.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×