Enterprise security management system using hierarchical organization and multiple ownership structure
First Claim
1. A method comprising:
- identifying an administrator that has access rights and permissions to all network resources in a set of network resources;
assigning a first set of identifiers to a first set of users;
grouping the first set of users into a plurality of groups;
creating a hierarchical structure for the groups including determining a hierarchical relationship among the groups and the administrator wherein access rights and permissions are established for each group and wherein parent groups inherit access rights and permissions for their respective child groups and wherein the hierarchical structure includes one or more lines that each represent a direct path of related groups to the administrator;
for each user in the first set, associating one or more network resources in the set of network resources with a respective user wherein the one or more network resources are not the same for any user in the first set of users;
assigning a second set of identifiers to one or more of the first set of users, the second set of identifiers associating a respective one of the first set of users with at least one of a second set of users wherein the at least one of the second set of users is granted permission to access the one or more network resources associated with the respective one of the first set of users, wherein the at least one of the second set of users is not the administrator and not a group associated with the respective one of the first set of users or a parent or child group associated with the respective one of the first set of users and wherein the assigning of the second set of identifiers enables sharing of ownership over a respective network resource with a user that is outside of a line in the hierarchy associated with the respective one of the first set of users;
receiving a request from a requestor among the second set of users to access a network resource associated with one of the first set of users;
determining whether the requestor has permission to access the network resource;
determining which privileges the requestor is given relative to the network resource including when or if the requestor has permission to access the network resource; and
providing the requestor with the network resource based on the determined privilege.
6 Assignments
0 Petitions
Accused Products
Abstract
A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user'"'"'s group. All users within a group inherit the rights and restrictions of the group.
165 Citations
19 Claims
-
1. A method comprising:
-
identifying an administrator that has access rights and permissions to all network resources in a set of network resources; assigning a first set of identifiers to a first set of users; grouping the first set of users into a plurality of groups; creating a hierarchical structure for the groups including determining a hierarchical relationship among the groups and the administrator wherein access rights and permissions are established for each group and wherein parent groups inherit access rights and permissions for their respective child groups and wherein the hierarchical structure includes one or more lines that each represent a direct path of related groups to the administrator; for each user in the first set, associating one or more network resources in the set of network resources with a respective user wherein the one or more network resources are not the same for any user in the first set of users; assigning a second set of identifiers to one or more of the first set of users, the second set of identifiers associating a respective one of the first set of users with at least one of a second set of users wherein the at least one of the second set of users is granted permission to access the one or more network resources associated with the respective one of the first set of users, wherein the at least one of the second set of users is not the administrator and not a group associated with the respective one of the first set of users or a parent or child group associated with the respective one of the first set of users and wherein the assigning of the second set of identifiers enables sharing of ownership over a respective network resource with a user that is outside of a line in the hierarchy associated with the respective one of the first set of users; receiving a request from a requestor among the second set of users to access a network resource associated with one of the first set of users; determining whether the requestor has permission to access the network resource; determining which privileges the requestor is given relative to the network resource including when or if the requestor has permission to access the network resource; and providing the requestor with the network resource based on the determined privilege. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of organizing users in an enterprise, the method comprising:
-
assigning a user identifier and a password to an administrator for the enterprise; assigning a user identifier and password to at least one user of a plurality of users; assigning a group identifier to the at least one user for associating with a group; specifying a parent group identifier for the group assigned to the at least one user, the parent group identifier identifying a parent group containing one or more superior users who have access to resources owned by the at least one user, wherein the one or more superior users are not the administrator and wherein the specifying the parent group identifier enables sharing of ownership over a respective network resource between users in a respective parent group and the at least one user; assigning, by one or more processors, co-ownership to a resource to the at least one user with a second different user in the plurality of users, wherein the second different user is not the administrator or a user in the group or the parent group associated with the at least one user; storing the user identifier, password, and group identifier for the plurality of users in a user descriptor table; storing the group identifier and parent group identifier in a group descriptor table for associating a respective group with a respective parent group; and establishing a hierarchical relationship among the respective group and respective parent group based on the group and parent group identifier. - View Dependent Claims (11)
-
-
12. A system comprising:
-
a plurality of first devices; and a server coupled with the plurality of first devices through a network, wherein the server includes one or more processors that are configured to; identify an administrator that has access rights and permissions to all network resources in a set of network resources; assign a first set of identifiers to the plurality of first devices; grouping the first set of devices into a plurality of groups; creating a hierarchical structure for the groups including determining a hierarchical relationship among the groups and the administrator wherein access rights and permissions are established for each group and wherein parent groups inherit access rights and permissions for their respective child groups and wherein the hierarchical structure includes one or more lines that each represent a direct path of related groups to the administrator; for each of the first devices, associating one or more network resources in the set of network resources with a respective device wherein the one or more network resources are not the same for any device in the first plurality of devices; assign, by the one or more processors, a second set of identifiers to one or more of the plurality of first devices, the second set of identifiers associating a respective one of the plurality of first devices with at least one of a plurality of second devices, wherein the at least one of the plurality of second devices is granted permission to access one or more network resources associated with the respective one of the plurality of first devices wherein the at least one of the second devices is not associated with the administrator and not in a group associated with the respective one of the first set of devices or a parent or child group associated with the respective one of the first set of devices and wherein the assigning of the second set of identifiers enables sharing of ownership over a respective network resource with a device that is outside of a line in the hierarchy associated with the respective one of the first set of devices; receive a request from a requestor to access a network resource; determine whether the requestor has permission to access the network resource; determine which privileges the requestor is given relative to the network resource if the requestor has permission to access the network resource; and provide the requestor with the network resource based on the determined privilege. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification