US Patent No: 5,113,442

Number of patents in Portfolio can not be more than 2000

Method and apparatus for providing access control in a secure operating system

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A method, and an operating system utilizing this method, for controlling access rights among a plurality of users to a plurality of secure objects. Each user is provided a user identification number which is prime and each secure object is provided an access code which comprises a value that is a product of the user identification numbers of all users having the same access rights to that secure object. In response to a request by a user for access to a secure object, the access code for that secure object is divided by the user identification number of the requesting user. Access rights of the user to the requested secure object are determined based on whether the result of the division yields a zero remainder.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
SHL SYSTEMHOUSE CORP.NAPERVILLE, IL1

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Moir, Dale A Naperville, IL 1 65

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Honeywell Inc. (1)
4,644,543 Forward error correction hardware for a data adaptor 12 1984
 
NEC CORPORATION (1)
4,658,292 Enciphering key distribution system for subscription TV broadcast or catv system 94 1983

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
CISCO TECHNOLOGY, INC. (17)
7,836,490 Method and apparatus for providing network security using security labeling 7 2003
7,669,244 Method and system for generating user group permission lists 4 2004
7,877,796 Method and apparatus for best effort propagation of security group information 4 2004
7,886,145 Method and system for including security information with a packet 2 2004
7,721,323 Method and system for including network security information in a frame 0 2004
7,877,601 Method and system for including security information with a packet 1 2004
7,827,402 Method and apparatus for ingress filtering using security group information 2 2004
7,840,708 Method and system for the assignment of security group information using a proxy 3 2007
7,954,163 Method and apparatus for providing network security using role-based access control 2 2009
8,302,157 Method and system for generating user group identifiers 1 2010
8,561,140 Method and system for including network security information in a frame 0 2010
8,713,201 Method and system for the assignment of security group information using a proxy 0 2010
8,301,882 Method and apparatus for ingress filtering using security group information 0 2010
8,539,571 Method and apparatus for providing network security using security labeling 0 2010
8,621,596 Method and apparatus for best effort propagation of security group information 0 2011
8,555,056 Method and system for including security information with a packet 0 2011
8,661,556 Method and apparatus for providing network security using role-based access control 0 2011
 
NETWORK APPLIANCE, INC. (13)
6,457,130 File access control in a multi-protocol file server 85 1998
6,317,844 File server storage arrangement 79 1998
6,279,011 Backup and restore for heterogeneous file server environment 53 1998
6,119,244 Coordinating persistent status information with multiple file servers 110 1998
6,289,356 Write anywhere file-system layout 242 1998
6,516,351 Enforcing uniform file-locking for diverse file-locking protocols 63 1998
6,343,984 Laminar flow duct cooling system 2 1998
6,480,969 Providing parity in a RAID sub-system using non-volatile memory 13 1999
6,961,749 Scalable file server with highly available pairs 7 1999
6,883,120 Computer assisted automatic error detection and diagnosis of file servers 24 1999
6,715,034 Switching file system request in a mass storage system 5 1999
6,468,150 Laminar flow duct cooling system 12 2001
7,293,097 Enforcing uniform file-locking for diverse file-locking protocols 23 2002
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (7)
5,911,143 Method and system for advanced role-based access control in distributed and centralized computer systems 182 1995
6,189,036 User access to objects in group based access control based on result of greatest common divisor of assigned unique prime numbers of user and object 31 1998
6,823,338 Method, mechanism and computer program product for processing sparse hierarchical ACL data in a relational database 22 1998
6,785,822 System and method for role based dynamic configuration of user profiles 31 1999
7,389,430 Method for providing access control to single sign-on computer networks 1 2002
8,060,529 IM client and method for item sharing 0 2006
7,702,914 Method for providing access control to single sign-on computer networks 0 2008
 
HITACHI, LTD. (4)
7,032,062 Disk subsystem 3 2003
7,836,249 Disk subsystem 0 2004
8,234,437 Disk subsystem 0 2010
8,554,979 Disk subsystem 0 2012
 
NETAPP, INC. (3)
6,604,118 File system image transfer 152 1998
6,574,591 File systems image transfer between dissimilar file systems 49 1999
7,174,352 File system image transfer 77 2001
 
EMC CORPORATION (2)
5,848,435 Address protection circuit and method for preventing access to unauthorized address rangers 48 1995
8,185,751 Achieving strong cryptographic correlation between higher level semantic units and lower level components in a secure data storage system 1 2006
 
BAY NETWORKS GROUP, INC. (1)
5,537,099 Receiving port security in a network concentrator 32 1994
 
CANON KABUSHIKI KAISHA (1)
6,298,346 Method and apparatus for supporting cooperative activity 4 1995
 
CLICK CHOICE.COM, INC (1)
5,809,230 System and method for controlling access to personal computer system resources 115 1996
 
CRUCIAN GLOBAL SERVICES, INC. (1)
7,725,490 Collaborative file access management system 6 2001
 
FUJI XEROX CO., LTD. (1)
6,237,099 Electronic document management system 46 1997
 
FUJITSU LIMITED (1)
5,724,578 File managing system for managing files shared with a plurality of users 46 1995
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
5,978,914 Method and apparatus for preventing inadvertent changes to system-critical files in a computing system 6 1995
 
Hughes Aircraft Company (1)
5,504,814 Efficient security kernel for the 80960 extended architecture 233 1994
 
International Computers Limited (1)
5,339,403 Access control in a distributed computer system 74 1993
 
MAZ ENCRYPTION TECHNOLOGIES LLC (1)
7,096,358 Encrypting file system 2 2003
 
MOTOROLA MOBILITY LLC (1)
5,379,343 Detection of unauthorized use of software applications in communication units 66 1993
 
OMNISECURE, INC. (1)
5,584,023 Computer system including a transparent and secure file transform mechanism 191 1993
 
Prince Corporation (1)
5,406,270 Dead switch vehicle operator identification 37 1994
 
QWEST COMMUNICATIONS INTERNATIONAL INC. (1)
5,748,890 Method and system for authenticating and auditing access by a user to non-natively secured applications 107 1996
 
SECURE KEYS PTY LIMITED (1)
8,752,207 Security token and system and method for generating and decoding the security token 0 2008
 
Storage Technology Corporation (1)
6,957,330 Method and system for secure information handling 73 1999
 
SYSTEMS ADVISORY GROUP ENTERPRISES, INC. (1)
7,249,379 Method and apparatus for implementing process-based security in a computer system 7 2002
 
TREND MICRO INCORPORATED (1)
7,454,788 Method for adding and enforcing enhanced authorization policy on devices in computer operation systems 1 2001
 
WMS GAMING INC. (1)
8,713,652 Protecting a gaming machine from rogue code 0 2005