US Patent No: 5,113,442

Number of patents in Portfolio can not be more than 2000

Method and apparatus for providing access control in a secure operating system

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method, and an operating system utilizing this method, for controlling access rights among a plurality of users to a plurality of secure objects. Each user is provided a user identification number which is prime and each secure object is provided an access code which comprises a value that is a product of the user identification numbers of all users having the same access rights to that secure object. In response to a request by a user for access to a secure object, the access code for that secure object is divided by the user identification number of the requesting user. Access rights of the user to the requested secure object are determined based on whether the result of the division yields a zero remainder.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
SHL SYSTEMHOUSE CORP.NAPERVILLE, IL0

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Moir, Dale A Naperville, IL 1 67

Cited Art Landscape

Patent Info (Count) # Cites Year
 
NEC CORPORATION (1)
* 4,658,292 Enciphering key distribution system for subscription TV broadcast or catv system 97 1983
 
Honeywell Inc. (1)
* 4,644,543 Forward error correction hardware for a data adaptor 12 1984
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
MOTOROLA MOBILITY LLC (1)
* 5,379,343 Detection of unauthorized use of software applications in communication units 70 1993
 
Other [Check patent profile for assignment information] (1)
* 2011/0004,923 METHOD AND SYSTEM FOR GENERATING USER GROUP IDENTIFIERS 7 2010
 
TREND MICRO INCORPORATED (1)
* 7,454,788 Method for adding and enforcing enhanced authorization policy on devices in computer operation systems 1 2001
 
HITACHI, LTD. (5)
7,032,062 Disk subsystem 3 2003
7,836,249 Disk subsystem 0 2004
8,234,437 Disk subsystem 0 2010
8,554,979 Disk subsystem 0 2012
8,949,503 Disk subsystem 0 2013
 
International Computers Limited (1)
* 5,339,403 Access control in a distributed computer system 74 1993
 
Prince Corporation (1)
* 5,406,270 Dead switch vehicle operator identification 37 1994
 
OMNISECURE, INC. (1)
* 5,584,023 Computer system including a transparent and secure file transform mechanism 199 1993
 
BAY NETWORKS GROUP, INC. (1)
* 5,537,099 Receiving port security in a network concentrator 32 1994
 
Storage Technology Corporation (1)
6,957,330 Method and system for secure information handling 83 1999
 
WMS GAMING INC. (1)
* 8,713,652 Protecting a gaming machine from rogue code 0 2005
 
SECURE KEYS PTY LIMITED (2)
* 8,752,207 Security token and system and method for generating and decoding the security token 0 2008
* 2010/0180,339 SECURITY TOKEN AND SYSTEM AND METHOD FOR GENERATING AND DECODING THE SECURITY TOKEN 1 2008
 
CANON KABUSHIKI KAISHA (1)
* 6,298,346 Method and apparatus for supporting cooperative activity 4 1995
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (8)
* 5,911,143 Method and system for advanced role-based access control in distributed and centralized computer systems 192 1995
6,189,036 User access to objects in group based access control based on result of greatest common divisor of assigned unique prime numbers of user and object 34 1998
6,823,338 Method, mechanism and computer program product for processing sparse hierarchical ACL data in a relational database 27 1998
* 6,785,822 System and method for role based dynamic configuration of user profiles 32 1999
* 7,389,430 Method for providing access control to single sign-on computer networks 1 2002
* 8,060,529 IM client and method for item sharing 0 2006
8,949,202 Technique for controlling access to data 0 2007
7,702,914 Method for providing access control to single sign-on computer networks 0 2008
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
* 5,978,914 Method and apparatus for preventing inadvertent changes to system-critical files in a computing system 6 1995
 
CISCO TECHNOLOGY, INC. (17)
7,836,490 Method and apparatus for providing network security using security labeling 7 2003
* 7,669,244 Method and system for generating user group permission lists 6 2004
7,877,796 Method and apparatus for best effort propagation of security group information 5 2004
7,886,145 Method and system for including security information with a packet 2 2004
7,721,323 Method and system for including network security information in a frame 0 2004
7,877,601 Method and system for including security information with a packet 3 2004
7,827,402 Method and apparatus for ingress filtering using security group information 4 2004
7,840,708 Method and system for the assignment of security group information using a proxy 3 2007
7,954,163 Method and apparatus for providing network security using role-based access control 3 2009
* 8,302,157 Method and system for generating user group identifiers 1 2010
8,561,140 Method and system for including network security information in a frame 0 2010
8,713,201 Method and system for the assignment of security group information using a proxy 0 2010
8,301,882 Method and apparatus for ingress filtering using security group information 2 2010
8,539,571 Method and apparatus for providing network security using security labeling 0 2010
8,621,596 Method and apparatus for best effort propagation of security group information 0 2011
8,555,056 Method and system for including security information with a packet 1 2011
8,661,556 Method and apparatus for providing network security using role-based access control 0 2011
 
MAZ ENCRYPTION TECHNOLOGIES LLC (1)
7,096,358 Encrypting file system 2 2003
 
NETAPP INC. (3)
6,604,118 File system image transfer 174 1998
6,574,591 File systems image transfer between dissimilar file systems 58 1999
7,174,352 File system image transfer 85 2001
 
FUJITSU LIMITED (1)
* 5,724,578 File managing system for managing files shared with a plurality of users 47 1995
 
Hughes Aircraft Company (1)
* 5,504,814 Efficient security kernel for the 80960 extended architecture 234 1994
 
CRUCIAN GLOBAL SERVICES, INC. (1)
* 7,725,490 Collaborative file access management system 7 2001
 
FUJI XEROX CO., LTD. (1)
* 6,237,099 Electronic document management system 47 1997
 
CLICK CHOICE.COM, INC (1)
* 5,809,230 System and method for controlling access to personal computer system resources 119 1996
 
EMC CORPORATION (3)
* 5,848,435 Address protection circuit and method for preventing access to unauthorized address rangers 49 1995
* 8,185,751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system 3 2006
* 2007/0300,081 ACHIEVING STRONG CRYPTOGRAPHIC CORRELATION BETWEEN HIGHER LEVEL SEMANTIC UNITS AND LOWER LEVEL COMPONENTS IN A SECURE DATA STORAGE SYSTEM 1 2006
 
SYSTEMS ADVISORY GROUP ENTERPRISES, INC. (1)
7,249,379 Method and apparatus for implementing process-based security in a computer system 7 2002
 
QWEST COMMUNICATIONS INTERNATIONAL INC. (1)
* 5,748,890 Method and system for authenticating and auditing access by a user to non-natively secured applications 112 1996
 
NETWORK APPLIANCE, INC. (13)
* 6,457,130 File access control in a multi-protocol file server 90 1998
6,317,844 File server storage arrangement 83 1998
6,279,011 Backup and restore for heterogeneous file server environment 54 1998
* 6,119,244 Coordinating persistent status information with multiple file servers 113 1998
6,289,356 Write anywhere file-system layout 250 1998
6,516,351 Enforcing uniform file-locking for diverse file-locking protocols 65 1998
6,343,984 Laminar flow duct cooling system 3 1998
6,480,969 Providing parity in a RAID sub-system using non-volatile memory 13 1999
6,961,749 Scalable file server with highly available pairs 7 1999
6,883,120 Computer assisted automatic error detection and diagnosis of file servers 25 1999
6,715,034 Switching file system request in a mass storage system 6 1999
6,468,150 Laminar flow duct cooling system 12 2001
7,293,097 Enforcing uniform file-locking for diverse file-locking protocols 24 2002
* Cited By Examiner