×

Integrating user specified extensions into an information access system

  • US 7,155,737 B1
  • Filed: 05/11/1999
  • Issued: 12/26/2006
  • Est. Priority Date: 05/11/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of securely invoking an access control function, the method comprising the steps of:

  • receiving a digital signature for the access control function;

    generating a mapping of the access control function to the digital signature;

    determining that the digital signature is mapped to the access control function based on the mapping when execution of the access control function is requested;

    generating a plurality of records mapping access control events to access control functions along with an indication whether access control function invocation is active for each mapped access control event wherein said plurality of records are stored in a configuration file;

    detecting that an access control event related to controlling access to information resources on a computer system has occurred;

    determining that the access control event is mapped to the access control function;

    retrieving an executable element if the access control event is mapped to the access control function and if access control function invocation is active for the access control event;

    generating a digital signature for the retrieved executable element;

    determining whether the retrieved executable element matches the access control function by comparing the digital signature of the retrieved executable element and the digital signature for the access control function; and

    executing the retrieved executable element only when the retrieved executable element matches the access control function.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×