US20060236408A1 - Method and apparatus for device dependent access control for device independent web content - Google Patents

Method and apparatus for device dependent access control for device independent web content Download PDF

Info

Publication number
US20060236408A1
US20060236408A1 US11/105,612 US10561205A US2006236408A1 US 20060236408 A1 US20060236408 A1 US 20060236408A1 US 10561205 A US10561205 A US 10561205A US 2006236408 A1 US2006236408 A1 US 2006236408A1
Authority
US
United States
Prior art keywords
resource
user
user device
access
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/105,612
Inventor
Shunguo Yan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/105,612 priority Critical patent/US20060236408A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YAN, SHUNGUO
Publication of US20060236408A1 publication Critical patent/US20060236408A1/en
Priority to US12/135,436 priority patent/US7657946B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • the present invention relates to an improved data processing system.
  • the present invention relates to providing access control to resources of a data processing system.
  • the present invention relates to providing device dependent access control for device independent Web content in a data processing system.
  • pervasive devices In the current market, a variety of handheld or pervasive devices are available for consumers. Examples of pervasive devices include Web browsers, personal digital assistants (PDAs), smart phones, and traditional voice telephones. These devices support different security protocols, resources, and input capability. For example, a PDA may support input by a pen, while a traditional voice telephone only supports input by voice.
  • PDA personal digital assistant
  • voice telephone traditional voice telephone
  • a resource such as a spreadsheet or a chart image
  • a resource may be any data that is available in a given device, for example, an application, a Web page, a spreadsheet, or a data set.
  • Modern Web applications often adopt a device-independent approach to support various devices.
  • the page content containing business logic is independent from the display on a client device and is tailored to any device for display during run-time based on the device capability.
  • the device-independent approach gives all the devices the same access privilege to a resource.
  • Role-based access control may be used in applications for controlling resource access.
  • Role-based access control is a standard security policy that is applied for many applications, including J2EE based applications.
  • Role-based access control uses a two-dimensional matrix mechanism to control resource access.
  • the two dimensional matrix includes a user role axis that has a list of user roles and a resource axis that has a list of resources.
  • the list of user roles may include administrator, manager, editor or user.
  • the list of resources may include Web page, data set, application, or any combination of the above.
  • the content of the two dimensional matrix includes access rights or permissions assigned to a specific user for a given resource, for example, view, edit, or update.
  • programming-based access control can also be used in applications for controlling resource access.
  • Programming-based access control allows security control to be hard-coded in a program.
  • the user in order to add or change a device's access permissions, the user has to manually change the program code.
  • the present invention provides a method, an apparatus, and computer instructions in a data processing system for device dependent access control for device independent Web content.
  • the present invention provides a module that detects the device type and security level from a request for access to a resource of the data processing system by a user device, and loads a three-dimensional matrix from a data source, a configuration file, or any other types of resource.
  • the module then performs a lookup of the matrix based on a user role of the user device, a type and security level of user device, and the resource requested, and determines based on one of a plurality of devices of the device axis. If permission is granted to the user device, the module allows the user device to access the resource based on the permission. However, if the permission is not granted, the module denies the user device access to the resource and sends a warning to the user device.
  • FIG. 1 depicts a pictorial representation of a network of data processing systems in the present invention
  • FIG. 2 a block diagram of a data processing system that is depicted in accordance with an illustrative embodiment of the present invention
  • FIG. 3 is a diagram illustrating a known user role-based access control two dimensional matrix
  • FIG. 4 is a diagram illustrating a known programming based access control two dimensional matrix
  • FIG. 5 is a diagram illustrating device dependent access control three-dimensional matrix in accordance with an illustrative embodiment of the present invention
  • FIG. 6 is a diagram illustrating an exemplary grouping of devices in accordance with an illustrative embodiment of the present invention.
  • FIG. 7 is a flowchart of an exemplary process for device dependent access control for device independent Web content in accordance with an illustrative embodiment of the present invention.
  • FIG. 1 depicts a pictorial representation of a network of data processing systems in which the present invention may be implemented.
  • Network data processing system 100 is a network of computers in which the present invention may be implemented.
  • Network data processing system 100 contains a network 102 , which is the medium used to provide communications links between various devices and computers connected together within network data processing system 100 .
  • Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables.
  • server 104 is connected to network 102 along with storage unit 106 .
  • client 108 personal digital assistant 110 , and smart phone 112 are connected to network 102 .
  • Client 108 may be, for example, personal computers or network computers.
  • server 104 provides data, such as boot files, operating system images, and applications to client 108 .
  • Examples of applications in client 108 includes Web browsers 109 , which process Web based content from server 104 and displays it to the user. Since the Web content is device independent, other types of applications similar to Web browsers 109 may reside in personal digital assistant 110 and smart phone 112 for processing the device independent Web content received from server 104 .
  • Network data processing system 100 may include additional servers, clients, and other devices not shown, for example, traditional voice telephone or other mobile devices.
  • network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another.
  • TCP/IP Transmission Control Protocol/Internet Protocol
  • At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational and other computer systems that route data and messages.
  • network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN).
  • FIG. 1 is intended as an example, and not as an architectural limitation for the present invention.
  • Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality of processors 202 and 204 connected to system bus 206 . Alternatively, a single processor system may be employed. Also connected to system bus 206 is memory controller/cache 208 , which provides an interface to local memory 209 . I/O Bus Bridge 210 is connected to system bus 206 and provides an interface to I/O bus 212 . Memory controller/cache 208 and I/O Bus Bridge 210 may be integrated as depicted.
  • SMP symmetric multiprocessor
  • Peripheral component interconnect (PCI) bus bridge 214 connected to I/O bus 212 provides an interface to PCI local bus 216 .
  • PCI Peripheral component interconnect
  • a number of modems may be connected to PCI local bus 216 .
  • Typical PCI bus implementations will support four PCI expansion slots or add-in connectors.
  • Communications links to clients 108 - 112 in FIG. 1 may be provided through modem 218 and network adapter 220 connected to PCI local bus 216 through add-in connectors.
  • Additional PCI bus bridges 222 and 224 provide interfaces for additional PCI local buses 226 and 228 , from which additional modems or network adapters may be supported. In this manner, data processing system 200 allows connections to multiple network computers.
  • a memory-mapped graphics adapter 230 and hard disk 232 may also be connected to I/O bus 212 as depicted, either directly or indirectly.
  • FIG. 2 may vary.
  • other peripheral devices such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted.
  • the depicted example is not meant to imply architectural limitations with respect to the present invention.
  • the data processing system depicted in FIG. 2 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, N.Y., running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
  • AIX Advanced Interactive Executive
  • the present invention provides a method, apparatus, and computer instructions for device dependent access control for device independent Web content.
  • the present invention may be implemented as a module of a computer program executed by data processing system 200 in FIG. 2 .
  • the present invention extends the two dimensional matrix in the traditional role-based access control to a three-dimensional matrix.
  • the three-dimensional matrix includes a third axis, device, which has a list of devices used by a given user and can access a given resource.
  • access permission to a resource is controlled by user role as well as the device the user uses.
  • an administrator may group devices based on their security level.
  • a device may belong to one or more groups, with each group representing a different security level.
  • Web browser device Internet ExplorerTM 5.0 may belong to a different group than Web browser device Internet Explorers 5.0.5, since Intenet ExplorerTM 5.0.5 has several security patches applied.
  • grouping devices based on their security level helps ease management and configuration of the devices.
  • An administrator may define the security levels of devices in terms of the following: security protocols implemented by different devices, encryption scheme used by different devices, security patch applied by the same device, etc.
  • security protocols implemented by different devices
  • encryption scheme used by different devices security patch applied by the same device
  • a user may transfer sensitive data to a secured device rather than an unsecured device.
  • an administrator may temporarily remove or disable a device access to a resource in case of a suspicious virus attack while a user can still use other devices to access the same resource.
  • an administrator may disable the Pocket PC devices to which a required security patch is not applied while at the same time giving other Pocket-PC devices with the security patches applied access to the resources using the module, since the module has the capability of disabling devices based on security patch applied. Furthermore, an administrator may easily grant or deny access right to a new device, when it is introduced in the market into the operating environment.
  • an administrator may configure the three-dimensional matrix via a user interface.
  • the user interface may display a list of all supported devices and potential permissions, including view, edit, update, add, or deploy, in a matrix format.
  • an administrator may grant or deny permission to each device based on the security level of the device.
  • the matrix is preferably stored in a data source or a configuration file, such as an extensible markup language file, and the module reads into a resource-to-device assignment table at run time.
  • an administrator may store the matrix using other forms and in other types of storage without departing the spirit and scope of the present invention.
  • matrix 300 is a two-dimensional matrix that includes user role axis 302 and resource axis 304 .
  • the content of matrix 306 includes access permissions to a resource, such as deploy, create, delete, update, configure, assign, or view.
  • a user may access the resource using any device supported by the server since the web server provides device-independent web content for the client.
  • the web server provides device-independent web content for the client.
  • Windows mobile Pocket PC is an operating system for Pocket PCs personal digital assistants, available from Microsoft Corporation.
  • user role-based access fails to fine tune resource access based on device security.
  • FIG. 4 a prior art diagram illustrating a known programming based access control two dimensional matrix is depicted.
  • program 400 determines access control to a resource in multiple levels.
  • program 400 checks to see if a detected device is a Pocket PC 402 .
  • program 400 then checks to see if the detected device is Pocket PC 2002 404 , an example of a device model. If the detected device is Pocket PC 2002 404 , program 400 further checks to see if Pocket PC 2002 Security Patch 4 has been applied on the device 406 . If the security Pack has been applied, program 400 allows the user to access the resource using the Pocket PC 2002 device 408 . Otherwise, program 400 outputs the message “update your device with the security pack 4” to the user to warn of a device update 408 .
  • program 400 provides multi-level validations, if an administrator wants to add or remove the device's access permissions, the administrator has to manually change the program 400 .
  • Prior to the present invention there was no existing method that allows an administrator to add additional models or browser versions without modifying program 400 .
  • matrix 500 is a three-dimensional matrix that includes user role axis 502 , resource axis 504 , and device axis 506 .
  • content of matrix 512 includes access permissions to a resource, such as deploy, create, delete, update, configure, assign, or view.
  • device axis 506 may represent security levels of different devices.
  • different devices may implement or adopt different security protocols, and encryption schemes.
  • the same type of devices may be applied different security patches.
  • security protocols include proprietary protocol specific to device, Secure Sockets Layer (SSL) and Wireless Transaction Level Security (WTLS), etc.
  • encryption schemes include 32-bit, 64-bit, or 128-bit key encryption etc.
  • security patch applied include those published by the vendors for their specific devices, as normally indicated by device browser version, such as Internet ExplorerTM 5.0 and 5.0.5. The higher browser version is generally securer than a lower browser version.
  • device 1 508 may represent a PDA while device 2 510 may represent a smart phone.
  • device 1 508 may represent security protocols
  • device 1 508 may represent a wireless access protocols (WAP) device without WTSL
  • device 2 510 represents a WAP device with WTSL.
  • WAP wireless access protocols
  • device 1 508 may represent devices with different security patches applied
  • device 1 508 may represent Internet ExplorerTM 5.0
  • device 2 may represent Internet ExplorerTM 5.0.5
  • device axis 506 represents encryption schemes
  • device 1 508 may represent a device with 32-bit key encryption
  • device 2 510 may represent device with 64-bit key encryption.
  • device axis 506 may represent devices or device groups with different security levels, which is a combination of security protocols, and encryption schemes and security patches applied.
  • device 1 508 may represent a Web browser with Internet Explorer (IE) 5.0, a PDA with a 32-bit key encryption, and a WAP phone without WTSL.
  • Device 2 510 may represent a Web browser with IE 5.0.5, a PDA with 64-bit encryption, and a WAP phone with WTSL.
  • Device 3 511 may represent a Web browser with IE 6.0 and using SSL, a PDA with 128-key encryption and WTSL, etc.
  • an administrator may control access to resources based on security levels of the individual devices used by the user, in addition to user roles. Thus, a user may transfer sensitive data only to secured device, rather than non-secured ones. An administrator may disable access of a device infected with suspicious viruses to resources. In addition, an administrator may grant or deny access right to a new device without the need to modify the program code.
  • FIG. 6 a diagram illustrating an exemplary grouping of devices is depicted in accordance with an illustrative embodiment of the present invention.
  • an administrator may group devices 600 according to their types.
  • types of devices include Web browsers 602 , smart phones 604 , PDAs 606 , and voice telephones 608 .
  • the administrator may group devices based on their security levels.
  • the administrator may group Web browsers 602 further based on the type and version of the browsers 610 , for example, Internet ExplorerTM 6.3, NetscapeTM 7.0, and Mozilla 3.3.
  • Web browsers 602 may also be grouped by other parameters, for instance, the encryption schemes (128-bit, 64-bit or 32-bit key encryption etc.) 612 .
  • the administrator may group PDAs 606 based on their security level, such as encryption scheme.
  • the administrator may group PDAs 606 further based on whether the encryption scheme the PDA uses is a public key encryption 614 or Hash 32-bit with CE 3.3 encryption 616 .
  • the administrator may group PDAs 606 based on other parameters. For example, browser levels (Pocket Internet Explorer 2.0, Pocket Internet Explorer 3.0 etc.)
  • FIG. 7 a flowchart of an exemplary process for device dependent access control for device independent Web content is depicted in accordance with an illustrative embodiment of the present invention.
  • the process begins when the device dependent access control module loads the three-dimensional matrix during the start-up of the program from either a data source or a configuration file (step 702 ). The module then reads data into a resource-to-user assignment table (step 704 ) and resource-to-device assignment table (step 706 ). After a user logs into the server successfully (step 708 ), the device dependent access control module on a server detects the client device type and security level (step 710 ).
  • the module Based on the user role, device type and security levels in the matrix assignment tables, the module looks up the matrix tables for a given user and a given device type or security for the specific resource (step 712 ) and determines if the combination has access to a resource based on the permissions in the content of the matrix (step 714 )
  • the module allows access to the resource based on permissions (step 716 ). For example, if a user and device has “view” access to the resource, the module grants “view” access only. Otherwise, if the combination does not have access to the resource based on the permissions, the module denies access to the resource and sends a warning to the user (step 718 ). Others may be alerted that the subject device does not have the permissions to access the resource (step 720 ).
  • the present invention provides a method, apparatus and computer instructions for device dependent access control for device independent Web content.
  • an administrator may grant access to resources based on a security level of a user device.
  • the present invention allows the administrator to use a variety of security levels as criteria for access control.
  • administrators may grant or deny access to resources for new devices that are recently introduced in the market.
  • the present invention protects sensitive data intended only for secured devices.

Abstract

A method, an apparatus, and computer instructions are provided for device-dependent access control for device independent web content. In an illustrative embodiment, a module may be implemented in a computer program detects a client device and security level from a request for a resource by a client device. The module loads, from a data source or configuration file, a three-dimensional device dependent access control matrix, which includes a user role axis, a device axis, and a resource axis. Based on the security level of the device indicated by the device matrix, the module grants or denies access to the resource by the user device. The security levels may include security protocols implemented by different devices, encryption schemes implemented by different devices, and security patches applied by the same device.

Description

    BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • The present invention relates to an improved data processing system. In particular, the present invention relates to providing access control to resources of a data processing system. Still more particular, the present invention relates to providing device dependent access control for device independent Web content in a data processing system.
  • 2. Description of Related Art
  • In the current market, a variety of handheld or pervasive devices are available for consumers. Examples of pervasive devices include Web browsers, personal digital assistants (PDAs), smart phones, and traditional voice telephones. These devices support different security protocols, resources, and input capability. For example, a PDA may support input by a pen, while a traditional voice telephone only supports input by voice.
  • These devices may also have different screen sizes and bandwidth requirements. These variations present challenges in security and resource control for applications that support these devices. For example, a resource, such as a spreadsheet or a chart image, accessible by a user through a Web browser may not be available for the same user accessing through a smart phone, because either the resource is so sensitive that it should only be available to a secured smart phone or that the smart phone does not support the resource data format. A resource may be any data that is available in a given device, for example, an application, a Web page, a spreadsheet, or a data set.
  • Modern Web applications often adopt a device-independent approach to support various devices. In the device-independent approach, the page content containing business logic is independent from the display on a client device and is tailored to any device for display during run-time based on the device capability. The device-independent approach gives all the devices the same access privilege to a resource.
  • Traditionally, role-based access control may be used in applications for controlling resource access. Role-based access control is a standard security policy that is applied for many applications, including J2EE based applications. Role-based access control uses a two-dimensional matrix mechanism to control resource access. The two dimensional matrix includes a user role axis that has a list of user roles and a resource axis that has a list of resources. The list of user roles may include administrator, manager, editor or user. The list of resources may include Web page, data set, application, or any combination of the above. The content of the two dimensional matrix includes access rights or permissions assigned to a specific user for a given resource, for example, view, edit, or update.
  • While role-based access control solves the problem of who can access what resource, it does not distinguish users with different devices. Thus, a user that uses a smart phone is given the same access to a resource as the same user using a voice telephone. As more and more devices are introduced in the market, device capabilities and security becomes an issue. Different devices may have implemented different security protocols, and different encryption schemes, and applied different security patches. There is currently no existing mechanism that solves the problem of who and which device can access what resource. Thus, sensitive data that is only supposed to be delivered to a secured device may end up in an unsecured device.
  • In addition to role-based access control, programming-based access control can also be used in applications for controlling resource access. Programming-based access control allows security control to be hard-coded in a program. However, in order to add or change a device's access permissions, the user has to manually change the program code. There is no existing mechanism that dynamically configures new devices introduced in the market or removes existing devices for access control without modifying the program.
  • Therefore, it would be advantageous to have an improved method to control Web resources based not only on user role, but also on device security to achieve fine-grained access control, such that sensitive data may only be delivered to secured devices. In addition, it would be advantageous to have an improved method for adding or removing devices without the need to change the program code.
  • SUMMARY OF THE INVENTION
  • The present invention provides a method, an apparatus, and computer instructions in a data processing system for device dependent access control for device independent Web content. The present invention provides a module that detects the device type and security level from a request for access to a resource of the data processing system by a user device, and loads a three-dimensional matrix from a data source, a configuration file, or any other types of resource.
  • The module then performs a lookup of the matrix based on a user role of the user device, a type and security level of user device, and the resource requested, and determines based on one of a plurality of devices of the device axis. If permission is granted to the user device, the module allows the user device to access the resource based on the permission. However, if the permission is not granted, the module denies the user device access to the resource and sends a warning to the user device.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
  • FIG. 1 depicts a pictorial representation of a network of data processing systems in the present invention;
  • FIG. 2 a block diagram of a data processing system that is depicted in accordance with an illustrative embodiment of the present invention;
  • FIG. 3 is a diagram illustrating a known user role-based access control two dimensional matrix;
  • FIG. 4 is a diagram illustrating a known programming based access control two dimensional matrix;
  • FIG. 5 is a diagram illustrating device dependent access control three-dimensional matrix in accordance with an illustrative embodiment of the present invention;
  • FIG. 6 is a diagram illustrating an exemplary grouping of devices in accordance with an illustrative embodiment of the present invention; and
  • FIG. 7 is a flowchart of an exemplary process for device dependent access control for device independent Web content in accordance with an illustrative embodiment of the present invention.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • With reference now to the figures, FIG. 1 depicts a pictorial representation of a network of data processing systems in which the present invention may be implemented. Network data processing system 100 is a network of computers in which the present invention may be implemented. Network data processing system 100 contains a network 102, which is the medium used to provide communications links between various devices and computers connected together within network data processing system 100. Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables.
  • In the depicted example, server 104 is connected to network 102 along with storage unit 106. In addition, client 108, personal digital assistant 110, and smart phone 112 are connected to network 102. Client 108 may be, for example, personal computers or network computers. In the depicted example, server 104 provides data, such as boot files, operating system images, and applications to client 108. Examples of applications in client 108 includes Web browsers 109, which process Web based content from server 104 and displays it to the user. Since the Web content is device independent, other types of applications similar to Web browsers 109 may reside in personal digital assistant 110 and smart phone 112 for processing the device independent Web content received from server 104.
  • Client 108, personal digital assistant 110, and smart phone 112 are clients to server 104. Network data processing system 100 may include additional servers, clients, and other devices not shown, for example, traditional voice telephone or other mobile devices. In the depicted example, network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational and other computer systems that route data and messages. Of course, network data processing system 100 also may be implemented as a number of different types of networks, such as for example, an intranet, a local area network (LAN), or a wide area network (WAN). FIG. 1 is intended as an example, and not as an architectural limitation for the present invention.
  • Referring to FIG. 2, a block diagram of a data processing system that may be implemented as a server, such as server 104 in FIG. 1, is depicted in accordance with a preferred embodiment of the present invention. Data processing system 200 may be a symmetric multiprocessor (SMP) system including a plurality of processors 202 and 204 connected to system bus 206. Alternatively, a single processor system may be employed. Also connected to system bus 206 is memory controller/cache 208, which provides an interface to local memory 209. I/O Bus Bridge 210 is connected to system bus 206 and provides an interface to I/O bus 212. Memory controller/cache 208 and I/O Bus Bridge 210 may be integrated as depicted.
  • Peripheral component interconnect (PCI) bus bridge 214 connected to I/O bus 212 provides an interface to PCI local bus 216. A number of modems may be connected to PCI local bus 216. Typical PCI bus implementations will support four PCI expansion slots or add-in connectors. Communications links to clients 108-112 in FIG. 1 may be provided through modem 218 and network adapter 220 connected to PCI local bus 216 through add-in connectors.
  • Additional PCI bus bridges 222 and 224 provide interfaces for additional PCI local buses 226 and 228, from which additional modems or network adapters may be supported. In this manner, data processing system 200 allows connections to multiple network computers. A memory-mapped graphics adapter 230 and hard disk 232 may also be connected to I/O bus 212 as depicted, either directly or indirectly.
  • Those of ordinary skill in the art will appreciate that the hardware depicted in FIG. 2 may vary. For example, other peripheral devices, such as optical disk drives and the like, also may be used in addition to or in place of the hardware depicted. The depicted example is not meant to imply architectural limitations with respect to the present invention.
  • The data processing system depicted in FIG. 2 may be, for example, an IBM eServer pSeries system, a product of International Business Machines Corporation in Armonk, N.Y., running the Advanced Interactive Executive (AIX) operating system or LINUX operating system.
  • The present invention provides a method, apparatus, and computer instructions for device dependent access control for device independent Web content. In an illustrative embodiment, the present invention may be implemented as a module of a computer program executed by data processing system 200 in FIG. 2. The present invention extends the two dimensional matrix in the traditional role-based access control to a three-dimensional matrix. In addition to user role and resource axis, the three-dimensional matrix includes a third axis, device, which has a list of devices used by a given user and can access a given resource. Thus, access permission to a resource is controlled by user role as well as the device the user uses.
  • With the third axis, an administrator may group devices based on their security level. A device may belong to one or more groups, with each group representing a different security level. For example, Web browser device Internet Explorer™ 5.0 may belong to a different group than Web browser device Internet Explorers 5.0.5, since Intenet Explorer™ 5.0.5 has several security patches applied. As the number of devices introduced in the market increases, grouping devices based on their security level helps ease management and configuration of the devices.
  • An administrator may define the security levels of devices in terms of the following: security protocols implemented by different devices, encryption scheme used by different devices, security patch applied by the same device, etc. With the role and device-based three-dimensional matrix access control module, a user may transfer sensitive data to a secured device rather than an unsecured device. In addition, an administrator may temporarily remove or disable a device access to a resource in case of a suspicious virus attack while a user can still use other devices to access the same resource. For example, if a prevailing household Pocket PC IE virus is common among Pocket PC devices, an administrator may disable the Pocket PC devices to which a required security patch is not applied while at the same time giving other Pocket-PC devices with the security patches applied access to the resources using the module, since the module has the capability of disabling devices based on security patch applied. Furthermore, an administrator may easily grant or deny access right to a new device, when it is introduced in the market into the operating environment.
  • In an illustrative embodiment, an administrator may configure the three-dimensional matrix via a user interface. For each resource in the server, the user interface may display a list of all supported devices and potential permissions, including view, edit, update, add, or deploy, in a matrix format. With the user interface, an administrator may grant or deny permission to each device based on the security level of the device. The matrix is preferably stored in a data source or a configuration file, such as an extensible markup language file, and the module reads into a resource-to-device assignment table at run time. However, an administrator may store the matrix using other forms and in other types of storage without departing the spirit and scope of the present invention.
  • Turning now to FIG. 3, a prior art diagram illustrating a known user role-based access control two dimensional matrix is depicted. As shown in FIG. 3, matrix 300 is a two-dimensional matrix that includes user role axis 302 and resource axis 304. The content of matrix 306 includes access permissions to a resource, such as deploy, create, delete, update, configure, assign, or view.
  • If a user has access permission to a resource, he or she may access the resource using any device supported by the server since the web server provides device-independent web content for the client. Prior to the present invention, there was no current method that allows the user to access confidential data using Pocket PC 2003 instead of Pocket PC 2002, for instance. Windows mobile Pocket PC is an operating system for Pocket PCs personal digital assistants, available from Microsoft Corporation. Thus, user role-based access fails to fine tune resource access based on device security.
  • Turning now to FIG. 4, a prior art diagram illustrating a known programming based access control two dimensional matrix is depicted. As shown in FIG. 4, program 400 determines access control to a resource in multiple levels. First, program 400 checks to see if a detected device is a Pocket PC 402.
  • If the detected device is a Pocket PC, program 400 then checks to see if the detected device is Pocket PC 2002 404, an example of a device model. If the detected device is Pocket PC 2002 404, program 400 further checks to see if Pocket PC 2002 Security Patch 4 has been applied on the device 406. If the security Pack has been applied, program 400 allows the user to access the resource using the Pocket PC 2002 device 408. Otherwise, program 400 outputs the message “update your device with the security pack 4” to the user to warn of a device update 408.
  • While program 400 provides multi-level validations, if an administrator wants to add or remove the device's access permissions, the administrator has to manually change the program 400. Prior to the present invention, there was no existing method that allows an administrator to add additional models or browser versions without modifying program 400.
  • Turning now to FIG. 5, a diagram illustrating device dependent access control three-dimensional matrix is depicted in accordance with an illustrative embodiment of the present invention. As shown in FIG. 5, matrix 500 is a three-dimensional matrix that includes user role axis 502, resource axis 504, and device axis 506. Similar to two-dimension matrix 400 in FIG. 4, content of matrix 512 includes access permissions to a resource, such as deploy, create, delete, update, configure, assign, or view.
  • In addition to a list of individual devices, device axis 506 may represent security levels of different devices. For example, different devices may implement or adopt different security protocols, and encryption schemes. The same type of devices may be applied different security patches. Examples of security protocols include proprietary protocol specific to device, Secure Sockets Layer (SSL) and Wireless Transaction Level Security (WTLS), etc. Examples of encryption schemes include 32-bit, 64-bit, or 128-bit key encryption etc. Examples of security patch applied include those published by the vendors for their specific devices, as normally indicated by device browser version, such as Internet Explorer™ 5.0 and 5.0.5. The higher browser version is generally securer than a lower browser version.
  • In this illustrative example, if device axis 506 represents individual devices, device 1 508 may represent a PDA while device 2 510 may represent a smart phone. Alternatively, if device axis 506 represents security protocols, device 1 508 may represent a wireless access protocols (WAP) device without WTSL, while device 2 510 represents a WAP device with WTSL. If device axis 506 represents devices with different security patches applied, device 1 508 may represent Internet Explorer™ 5.0, while device 2 may represent Internet Explorer™ 5.0.5. If device axis 506 represents encryption schemes, device 1 508 may represent a device with 32-bit key encryption, while device 2 510 may represent device with 64-bit key encryption. In addition, device axis 506 may represent devices or device groups with different security levels, which is a combination of security protocols, and encryption schemes and security patches applied. For instance, device 1 508 may represent a Web browser with Internet Explorer (IE) 5.0, a PDA with a 32-bit key encryption, and a WAP phone without WTSL. Device 2 510 may represent a Web browser with IE 5.0.5, a PDA with 64-bit encryption, and a WAP phone with WTSL. Device 3 511 may represent a Web browser with IE 6.0 and using SSL, a PDA with 128-key encryption and WTSL, etc.
  • With device axis 506, an administrator may control access to resources based on security levels of the individual devices used by the user, in addition to user roles. Thus, a user may transfer sensitive data only to secured device, rather than non-secured ones. An administrator may disable access of a device infected with suspicious viruses to resources. In addition, an administrator may grant or deny access right to a new device without the need to modify the program code.
  • Turning now to FIG. 6, a diagram illustrating an exemplary grouping of devices is depicted in accordance with an illustrative embodiment of the present invention. As shown in FIG. 6, an administrator may group devices 600 according to their types. In this example, types of devices include Web browsers 602, smart phones 604, PDAs 606, and voice telephones 608.
  • Next, the administrator may group devices based on their security levels. In this example, the administrator may group Web browsers 602 further based on the type and version of the browsers 610, for example, Internet Explorer™ 6.3, Netscape™ 7.0, and Mozilla 3.3. Web browsers 602 may also be grouped by other parameters, for instance, the encryption schemes (128-bit, 64-bit or 32-bit key encryption etc.) 612.
  • Similarly, the administrator may group PDAs 606 based on their security level, such as encryption scheme. In this example, the administrator may group PDAs 606 further based on whether the encryption scheme the PDA uses is a public key encryption 614 or Hash 32-bit with CE 3.3 encryption 616. In addition, the administrator may group PDAs 606 based on other parameters. For example, browser levels (Pocket Internet Explorer 2.0, Pocket Internet Explorer 3.0 etc.)
  • Turning now to FIG. 7, a flowchart of an exemplary process for device dependent access control for device independent Web content is depicted in accordance with an illustrative embodiment of the present invention. As shown in FIG. 7, the process begins when the device dependent access control module loads the three-dimensional matrix during the start-up of the program from either a data source or a configuration file (step 702). The module then reads data into a resource-to-user assignment table (step 704) and resource-to-device assignment table (step 706). After a user logs into the server successfully (step 708), the device dependent access control module on a server detects the client device type and security level (step 710). Based on the user role, device type and security levels in the matrix assignment tables, the module looks up the matrix tables for a given user and a given device type or security for the specific resource (step 712) and determines if the combination has access to a resource based on the permissions in the content of the matrix (step 714)
  • If the combination has access to the resource based on the permissions, the module allows access to the resource based on permissions (step 716). For example, if a user and device has “view” access to the resource, the module grants “view” access only. Otherwise, if the combination does not have access to the resource based on the permissions, the module denies access to the resource and sends a warning to the user (step 718). Others may be alerted that the subject device does not have the permissions to access the resource (step 720).
  • In summary, the present invention provides a method, apparatus and computer instructions for device dependent access control for device independent Web content. With the present invention, an administrator may grant access to resources based on a security level of a user device. The present invention allows the administrator to use a variety of security levels as criteria for access control. In addition, administrators may grant or deny access to resources for new devices that are recently introduced in the market. Furthermore, the present invention protects sensitive data intended only for secured devices.
  • It is important to note that while the present invention has been described in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer readable medium of instructions and a variety of forms and that the present invention applies equally regardless of the particular type of signal bearing media actually used to carry out the distribution. Examples of computer readable media include recordable-type media, such as a floppy disk, a hard disk drive, a RAM, CD-ROMs, DVD-ROMs, and transmission-type media, such as digital and analog communications links, wired or wireless communications links using transmission forms, such as, for example, radio frequency and light wave transmissions. The computer readable media may take the form of coded formats that are decoded for actual use in a particular data processing system.
  • The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (20)

1. A method in a data processing system for device dependent access control for device independent content, the method comprising:
detecting a device type and a security level from a request for access to a resource of the data processing system by a user device, responsive to a user device login; and
loading a three-dimensional matrix from one of a data source and a configuration file, wherein the matrix includes a user role axis, a device axis, and a resource axis.
2. The method of claim 1, further comprising:
performing a lookup of a plurality of matrix assignment tables based on a user role of the user device, a type of user device, and the resource requested;
determining, based on one of a plurality of devices of the device axis, if permission is granted to the user device;
if the permission is granted, allowing the user device to access the resource; and
if the permission is not granted, denying the user device access to the resource and sending a warning to at least one of the user device and another.
3. The method of claim 2, wherein the plurality of devices represent a plurality of security levels, wherein the plurality of security levels include a security protocol implemented in different devices, an encryption scheme implemented in different devices, a security patch applied in a device, and a combination of a security protocol, an encryption scheme, and a security patch applied.
4. The method of claim 2, wherein the plurality of devices is grouped by a type of the device, and is further grouped by a security level of the device.
5. The method of claim 2, wherein the user role includes an administrator, a user, and a manager.
6. The method of claim 2, wherein the type of user device includes a personal digital assistant, a Web browser, a smart phone, and a telephone.
7. The method of claim 2, wherein the resource requested include at least one of an application, a data set, a Web page, and a spreadsheet.
8. The method of claim 2, wherein the permission includes at least one of deploy, create, delete, update, assign, view, and configure.
9. The method of claim 3, wherein the security protocol implemented in different devices includes at least one of a proprietary security protocol, and a wireless access protocol.
10. The method of claim 3, wherein the encryption scheme includes at least one of public key encryption, 32-bit key encryption, 64-bit key encryption, and 128-bit key encryption.
11. The method of claim 3, wherein the security patch applied in a device includes at least one of security patches published by vendors for specific devices, and a browser version of the device.
12. The method of claim 2, wherein the detecting, loading, determining, allowing, and denying steps are performed by a module implemented in a computer program executed by the data processing system.
13. The method of claim 1, wherein the three-dimensional matrix is configured by an administrator via a user interface.
14. The method of claim 1, wherein the loading step comprises:
reading data from the three-dimensional matrix into a resource-to-user assignment table; and
reading data from the three-dimensional matrix into a resource-to-device assignment table.
15. A data processing system comprising:
a bus;
a memory connected to the bus, wherein a set of instructions are located in the memory; and
a processor connected to the bus, wherein the processor executes the set of instructions to detect a device type and a security level from a request for access to a resource of the data processing system by a user device, responsive to a user device login, load a three-dimensional matrix from one of a data source and a configuration file, wherein the matrix includes a user role axis, a device axis, and a resource axis.
16. The data processing system of claim 15, wherein the processor further executes the set of instructions to perform a lookup of a plurality of matrix assignment tables based on a user role of the user device, a type of user device, and the resource requested, determine, based on one of a plurality of devices of the device axis, if permission is granted to the user device, allow the user device to access the resource if the permission is granted, and deny the user device access to the resource and sending a warning to at least one of the user device and another if the permission is not granted.
17. The data processing system of claim 15, wherein the processor, in executing the set of instructions to load a three-dimensional matrix from one of a data source or a configuration file, reads data from the three-dimensional matrix into a resource-to-user assignment table, and reads data from the three-dimensional matrix into a resource-to-device assignment table.
18. A computer program product in a computer readable medium for device dependent access control for device independent Web content, the computer program product comprising:
first instructions for detecting a device type and a security level from a request for access to a resource of the data processing system by a user device, responsive to a user device login; and
second instructions for loading a three-dimensional matrix from at least one of a data source or a configuration file, wherein the matrix includes a user role axis, a device axis, and a resource axis.
19. The computer program product of claim 18, further comprising:
third instructions for performing a lookup of a plurality of matrix assignment tables based on a user role of the user device, a type of user device, and the resource requested;
fourth instructions for determining, based on one of a plurality of devices of the device axis, if permission is granted to the user device;
fifth instructions for allowing the user device to access the resource if the permission is granted; and
sixth instructions for denying the user device access to the resource and sending a warning to at least one of the user device and another if the permission is not granted.
20. The computer program product of claim 18, wherein the second instructions comprises:
first sub-instructions for reading data from the three-dimensional matrix into a resource-to-user assignment table; and
second sub-instructions for reading data from the three-dimensional matrix into a resource-to-device assignment table.
US11/105,612 2005-04-14 2005-04-14 Method and apparatus for device dependent access control for device independent web content Abandoned US20060236408A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/105,612 US20060236408A1 (en) 2005-04-14 2005-04-14 Method and apparatus for device dependent access control for device independent web content
US12/135,436 US7657946B2 (en) 2005-04-14 2008-06-09 Method for device dependent access control for device independent web content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/105,612 US20060236408A1 (en) 2005-04-14 2005-04-14 Method and apparatus for device dependent access control for device independent web content

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/135,436 Continuation US7657946B2 (en) 2005-04-14 2008-06-09 Method for device dependent access control for device independent web content

Publications (1)

Publication Number Publication Date
US20060236408A1 true US20060236408A1 (en) 2006-10-19

Family

ID=37110135

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/105,612 Abandoned US20060236408A1 (en) 2005-04-14 2005-04-14 Method and apparatus for device dependent access control for device independent web content
US12/135,436 Expired - Fee Related US7657946B2 (en) 2005-04-14 2008-06-09 Method for device dependent access control for device independent web content

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/135,436 Expired - Fee Related US7657946B2 (en) 2005-04-14 2008-06-09 Method for device dependent access control for device independent web content

Country Status (1)

Country Link
US (2) US20060236408A1 (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060021007A1 (en) * 2004-07-21 2006-01-26 Rensin David K System and method for lost data destruction of electronic data stored on portable electronic devices
US20060021006A1 (en) * 2004-07-21 2006-01-26 Rensin David K System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US20060265733A1 (en) * 2005-05-23 2006-11-23 Xuemin Chen Method and apparatus for security policy and enforcing mechanism for a set-top box security processor
US20070143848A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security for polymorphic attacks
US20070143847A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing automatic signature generation and enforcement
US20070156650A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for accessing a shared space in a provider-tenant environment
US20070156806A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for deploying a tenant in a provider-tenant environment
US20070156849A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Systems and methods for delivering software upgrades in a provider-tenant environment
US20070156901A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Generation and use of table links in a provider-tenant environment
US20070156848A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Software management systems and methods, including use of such systems and methods in a provider-tenant environment
US20070156902A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for implementing a tenant space in a provider-tenant environment
US20070162452A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Systems and methods for implementing a shared space in a provider-tenant environment
US20070162969A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Provider-tenant systems, and methods for using the same
US20070180491A1 (en) * 2006-01-27 2007-08-02 Microsoft Corporation Authorization scheme to simplify security configurations
US20070256127A1 (en) * 2005-12-16 2007-11-01 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US20080162536A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Systems and methods for extending shared data structures with tenant content in a provider-tenant environment
US20080162483A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for protecting shared tables against unauthorized overwriting from a tenant space in a mega-tenancy environment
US20080162490A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for automatic registration during deployment of a tenant
US20080162660A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Systems and methods for accessing a shared space in a provider-tenant environment by using middleware
US20080242405A1 (en) * 2007-03-30 2008-10-02 Microsoft Corporation On-line gaming authentication
US20090119743A1 (en) * 2007-11-07 2009-05-07 Mcafee, Inc. Method and system for generic real time management of devices on computers connected to a network
US20090300718A1 (en) * 2004-07-21 2009-12-03 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US7680825B2 (en) 2005-12-30 2010-03-16 Sap Ag Systems and methods for generating tenant-specific properties for use in a provider-tenant environment
US20100107213A1 (en) * 2008-10-23 2010-04-29 Microsoft Corporation Access Control State Determination Based on Security Policy and Secondary Access Control State
US20100242111A1 (en) * 2005-12-16 2010-09-23 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20110072490A1 (en) * 2005-05-23 2011-03-24 Broadcom Corporation Method and apparatus for constructing an accss control matrix for a set-top box security
US7933869B2 (en) 2006-12-29 2011-04-26 Sap Ag Method and system for cloning a tenant database in a multi-tenant system
US20110153576A1 (en) * 2009-12-22 2011-06-23 Daniel Figus Multi-Client Generic Persistence for Extension Fields
US8069184B2 (en) 2006-12-29 2011-11-29 Sap Ag Systems and methods to implement extensibility of tenant content in a provider-tenant environment
US20110321154A1 (en) * 2010-06-25 2011-12-29 Sap Ag Systems and methods for generating constraints for use in access control
US20120005387A1 (en) * 2010-06-30 2012-01-05 Sedayao Jeffrey C Interrupt blocker
US8185933B1 (en) * 2006-02-02 2012-05-22 Juniper Networks, Inc. Local caching of endpoint security information
US20130031120A1 (en) * 2011-07-25 2013-01-31 Luca Passani System and Method for using a Device Description Repository
WO2013147757A1 (en) * 2012-03-28 2013-10-03 Intel Corporation Conditional limited service grant based on device verification
US20130290851A1 (en) * 2012-04-30 2013-10-31 Microsoft Corporation User interface web services
CN103634271A (en) * 2012-08-21 2014-03-12 腾讯科技(深圳)有限公司 An authority control system, an apparatus and an authority control method for a network request
US8892495B2 (en) 1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore
US20150178516A1 (en) * 2013-12-23 2015-06-25 Dropbox, Inc. Restricting access to content
US9177176B2 (en) 2006-02-27 2015-11-03 Broadcom Corporation Method and system for secure system-on-a-chip architecture for multimedia data processing
US9489318B2 (en) 2006-06-19 2016-11-08 Broadcom Corporation Method and system for accessing protected memory
US9535563B2 (en) 1999-02-01 2017-01-03 Blanding Hovenweep, Llc Internet appliance system and method
US9652637B2 (en) 2005-05-23 2017-05-16 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for allowing no code download in a code download scheme
US9904809B2 (en) 2006-02-27 2018-02-27 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for multi-level security initialization and configuration
US10397852B2 (en) * 2014-02-12 2019-08-27 Alcatel Lucent Method for access resource management of mobile transceiver by base station transceiver and apparatus associated therewith
CN110192197A (en) * 2017-01-12 2019-08-30 霍尼韦尔国际公司 Identity is established by using certificate and trusts the technology to realize the guarantee of certified products equipment
US11050817B2 (en) 2006-09-07 2021-06-29 Rateze Remote Mgmt Llc Voice operated control device
US11204952B2 (en) * 2012-12-28 2021-12-21 Microsoft Technology Licensing, Llc Detecting anomalies in behavioral network with contextual side information
US11323771B2 (en) * 2006-09-07 2022-05-03 Rateze Remote Mgmt Llc Voice operated remote control
US20220206961A1 (en) * 2020-12-28 2022-06-30 Lempel Mordkhai Architecture, system and methods thereof for secure computing using hardware security classifications
US11611573B1 (en) 2021-09-20 2023-03-21 Normalyze, Inc. In-cloud and constant time scanners
US20230094856A1 (en) * 2021-09-20 2023-03-30 Normalyze, Inc. Compact cloud access network based on role-to-resource detection with resource state change tracking and provenance
US20230198962A1 (en) * 2019-12-10 2023-06-22 Winkk, Inc Method and apparatus for secure application framework and platform

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7536548B1 (en) * 2002-06-04 2009-05-19 Rockwell Automation Technologies, Inc. System and methodology providing multi-tier-security for network data exchange with industrial control components
US8327456B2 (en) * 2007-04-13 2012-12-04 Microsoft Corporation Multiple entity authorization model
US9430660B2 (en) * 2008-01-31 2016-08-30 International Business Machines Corporation Managing access in one or more computing systems
US9602971B2 (en) * 2010-04-14 2017-03-21 Nokia Technologies Oy Controlling dynamically-changing traffic load of whitespace devices for database access
GB2498142B (en) 2010-09-22 2019-01-16 Ibm Data Distribution Apparatus
US20120303533A1 (en) * 2011-05-26 2012-11-29 Michael Collins Pinkus System and method for securing, distributing and enforcing for-hire vehicle operating parameters
US20130060721A1 (en) 2011-09-02 2013-03-07 Frias Transportation Infrastructure, Llc Systems and methods for pairing of for-hire vehicle meters and medallions
US9106650B2 (en) 2011-11-09 2015-08-11 Microsoft Technology Licensing, Llc User-driven access control
US9503478B2 (en) * 2014-01-27 2016-11-22 Honeywell International Inc. Policy-based secure communication with automatic key management for industrial control and automation systems
DE102014000963A1 (en) 2014-01-23 2015-07-23 Unify Gmbh & Co. Kg Method for handling security settings in a mobile terminal or for access control, mobile terminal, computer program, software product and digital storage medium
US9734309B1 (en) * 2014-03-24 2017-08-15 Amazon Technologies, Inc. Role-based access control assignment
US10038552B2 (en) 2015-11-30 2018-07-31 Honeywell International Inc. Embedded security architecture for process control systems
US10855462B2 (en) 2016-06-14 2020-12-01 Honeywell International Inc. Secure in-band upgrade using key revocation lists and certificate-less asymmetric tertiary key pairs
US10749692B2 (en) 2017-05-05 2020-08-18 Honeywell International Inc. Automated certificate enrollment for devices in industrial control systems or other systems

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6041412A (en) * 1997-11-14 2000-03-21 Tl Technology Rerearch (M) Sdn. Bhd. Apparatus and method for providing access to secured data or area
US6161139A (en) * 1998-07-10 2000-12-12 Encommerce, Inc. Administrative roles that govern access to administrative functions
US20020010679A1 (en) * 2000-07-06 2002-01-24 Felsher David Paul Information record infrastructure, system and method
US6453353B1 (en) * 1998-07-10 2002-09-17 Entrust, Inc. Role-based navigation of information resources
US20020147801A1 (en) * 2001-01-29 2002-10-10 Gullotta Tony J. System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US20030037263A1 (en) * 2001-08-08 2003-02-20 Trivium Systems Inc. Dynamic rules-based secure data access system for business computer platforms
US20030221012A1 (en) * 2002-05-22 2003-11-27 International Business Machines Corporation Resource manager system and method for access control to physical resources in an application hosting environment
US20030219127A1 (en) * 2002-05-24 2003-11-27 Russ Samuel H. Apparatus for entitling remote client devices
US20040019799A1 (en) * 2001-12-20 2004-01-29 Matthias Vering Role-based portal to a workplace system
US20040162906A1 (en) * 2003-02-14 2004-08-19 Griffin Philip B. System and method for hierarchical role-based entitlements
US20040162905A1 (en) * 2003-02-14 2004-08-19 Griffin Philip B. Method for role and resource policy management optimization
US20040162894A1 (en) * 2003-02-14 2004-08-19 Griffin Philip B. Method for role and resource policy management
US20050038688A1 (en) * 2003-08-15 2005-02-17 Collins Albert E. System and method for matching local buyers and sellers for the provision of community based services
US20060100912A1 (en) * 2002-12-16 2006-05-11 Questerra Llc. Real-time insurance policy underwriting and risk management

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060008256A1 (en) * 2003-10-01 2006-01-12 Khedouri Robert K Audio visual player apparatus and system and method of content distribution using the same

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6041412A (en) * 1997-11-14 2000-03-21 Tl Technology Rerearch (M) Sdn. Bhd. Apparatus and method for providing access to secured data or area
US6161139A (en) * 1998-07-10 2000-12-12 Encommerce, Inc. Administrative roles that govern access to administrative functions
US6182142B1 (en) * 1998-07-10 2001-01-30 Encommerce, Inc. Distributed access management of information resources
US6453353B1 (en) * 1998-07-10 2002-09-17 Entrust, Inc. Role-based navigation of information resources
US20020010679A1 (en) * 2000-07-06 2002-01-24 Felsher David Paul Information record infrastructure, system and method
US20020147801A1 (en) * 2001-01-29 2002-10-10 Gullotta Tony J. System and method for provisioning resources to users based on policies, roles, organizational information, and attributes
US20030037263A1 (en) * 2001-08-08 2003-02-20 Trivium Systems Inc. Dynamic rules-based secure data access system for business computer platforms
US20040019799A1 (en) * 2001-12-20 2004-01-29 Matthias Vering Role-based portal to a workplace system
US20030221012A1 (en) * 2002-05-22 2003-11-27 International Business Machines Corporation Resource manager system and method for access control to physical resources in an application hosting environment
US20030219127A1 (en) * 2002-05-24 2003-11-27 Russ Samuel H. Apparatus for entitling remote client devices
US20060100912A1 (en) * 2002-12-16 2006-05-11 Questerra Llc. Real-time insurance policy underwriting and risk management
US20040162906A1 (en) * 2003-02-14 2004-08-19 Griffin Philip B. System and method for hierarchical role-based entitlements
US20040162905A1 (en) * 2003-02-14 2004-08-19 Griffin Philip B. Method for role and resource policy management optimization
US20040162894A1 (en) * 2003-02-14 2004-08-19 Griffin Philip B. Method for role and resource policy management
US20050038688A1 (en) * 2003-08-15 2005-02-17 Collins Albert E. System and method for matching local buyers and sellers for the provision of community based services

Cited By (96)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8892495B2 (en) 1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore
US9535563B2 (en) 1999-02-01 2017-01-03 Blanding Hovenweep, Llc Internet appliance system and method
US20100115579A1 (en) * 2004-07-21 2010-05-06 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on portable electronic devices
US20060021006A1 (en) * 2004-07-21 2006-01-26 Rensin David K System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US20060021007A1 (en) * 2004-07-21 2006-01-26 Rensin David K System and method for lost data destruction of electronic data stored on portable electronic devices
US20090300718A1 (en) * 2004-07-21 2009-12-03 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US7543144B2 (en) * 2004-07-21 2009-06-02 Beachhead Solutions System and method for lost data destruction of electronic data stored on portable electronic devices
US7540016B2 (en) 2004-07-21 2009-05-26 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US9449159B2 (en) 2004-07-21 2016-09-20 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on a portable electronic device which communicates with servers that are inside of and outside of a firewall
US20110197258A1 (en) * 2004-07-21 2011-08-11 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on portable electronic devices
US8037304B2 (en) * 2004-07-21 2011-10-11 Beachhead Solutions, Inc. System and method for lost data destruction of electronic data stored on portable electronic devices
US8185735B2 (en) * 2004-07-21 2012-05-22 Beachead Solutions, Inc. System and method for lost data destruction of electronic data stored on portable electronic devices
US8347357B2 (en) 2005-05-23 2013-01-01 Broadcom Corporation Method and apparatus for constructing an access control matrix for a set-top box security processor
US20110072490A1 (en) * 2005-05-23 2011-03-24 Broadcom Corporation Method and apparatus for constructing an accss control matrix for a set-top box security
US7913289B2 (en) * 2005-05-23 2011-03-22 Broadcom Corporation Method and apparatus for security policy and enforcing mechanism for a set-top box security processor
US9652637B2 (en) 2005-05-23 2017-05-16 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for allowing no code download in a code download scheme
US20060265733A1 (en) * 2005-05-23 2006-11-23 Xuemin Chen Method and apparatus for security policy and enforcing mechanism for a set-top box security processor
US8255995B2 (en) 2005-12-16 2012-08-28 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070256127A1 (en) * 2005-12-16 2007-11-01 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8413245B2 (en) * 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US8495743B2 (en) 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US9286469B2 (en) 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US20100242111A1 (en) * 2005-12-16 2010-09-23 Kraemer Jeffrey A Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070143847A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing automatic signature generation and enforcement
US20070143848A1 (en) * 2005-12-16 2007-06-21 Kraemer Jeffrey A Methods and apparatus providing computer and network security for polymorphic attacks
US7680825B2 (en) 2005-12-30 2010-03-16 Sap Ag Systems and methods for generating tenant-specific properties for use in a provider-tenant environment
US20070156901A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Generation and use of table links in a provider-tenant environment
US7698284B2 (en) 2005-12-30 2010-04-13 Sap Ag Systems and methods for deploying a tenant in a provider-tenant environment
US20070162969A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Provider-tenant systems, and methods for using the same
US7689593B2 (en) 2005-12-30 2010-03-30 Sap Ag Systems and methods for accessing a shared space in a provider-tenant environment
US20070156849A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Systems and methods for delivering software upgrades in a provider-tenant environment
US20070162452A1 (en) * 2005-12-30 2007-07-12 Becker Wolfgang A Systems and methods for implementing a shared space in a provider-tenant environment
US20070156848A1 (en) * 2005-12-30 2007-07-05 Wolfgang Becker Software management systems and methods, including use of such systems and methods in a provider-tenant environment
US20070156806A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for deploying a tenant in a provider-tenant environment
US7917607B2 (en) 2005-12-30 2011-03-29 Sap Ag Software management systems and methods, including use of such systems and methods in a provider-tenant environment
US7930318B2 (en) 2005-12-30 2011-04-19 Sap Ag Systems and methods for implementing a tenant space in a provider-tenant environment
US20070156650A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for accessing a shared space in a provider-tenant environment
US7693851B2 (en) 2005-12-30 2010-04-06 Sap Ag Systems and methods for implementing a shared space in a provider-tenant environment
US20070156902A1 (en) * 2005-12-30 2007-07-05 Becker Wolfgang A Systems and methods for implementing a tenant space in a provider-tenant environment
US7992190B2 (en) * 2006-01-27 2011-08-02 Microsoft Corporation Authorization scheme to simplify security configurations
US20070180491A1 (en) * 2006-01-27 2007-08-02 Microsoft Corporation Authorization scheme to simplify security configurations
US8185933B1 (en) * 2006-02-02 2012-05-22 Juniper Networks, Inc. Local caching of endpoint security information
US9904809B2 (en) 2006-02-27 2018-02-27 Avago Technologies General Ip (Singapore) Pte. Ltd. Method and system for multi-level security initialization and configuration
US9177176B2 (en) 2006-02-27 2015-11-03 Broadcom Corporation Method and system for secure system-on-a-chip architecture for multimedia data processing
US9489318B2 (en) 2006-06-19 2016-11-08 Broadcom Corporation Method and system for accessing protected memory
US11050817B2 (en) 2006-09-07 2021-06-29 Rateze Remote Mgmt Llc Voice operated control device
US11323771B2 (en) * 2006-09-07 2022-05-03 Rateze Remote Mgmt Llc Voice operated remote control
US11729461B2 (en) 2006-09-07 2023-08-15 Rateze Remote Mgmt Llc Audio or visual output (A/V) devices registering with a wireless hub system
US11451621B2 (en) 2006-09-07 2022-09-20 Rateze Remote Mgmt Llc Voice operated control device
US11570393B2 (en) 2006-09-07 2023-01-31 Rateze Remote Mgmt Llc Voice operated control device
US20080162536A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Systems and methods for extending shared data structures with tenant content in a provider-tenant environment
US8069184B2 (en) 2006-12-29 2011-11-29 Sap Ag Systems and methods to implement extensibility of tenant content in a provider-tenant environment
US20080162483A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for protecting shared tables against unauthorized overwriting from a tenant space in a mega-tenancy environment
US20080162490A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Methods and systems for automatic registration during deployment of a tenant
US7933869B2 (en) 2006-12-29 2011-04-26 Sap Ag Method and system for cloning a tenant database in a multi-tenant system
US20080162660A1 (en) * 2006-12-29 2008-07-03 Becker Wolfgang A Systems and methods for accessing a shared space in a provider-tenant environment by using middleware
US7739348B2 (en) 2006-12-29 2010-06-15 Sap Ag Systems and methods for accessing a shared space in a provider-tenant environment by using middleware
US20080242405A1 (en) * 2007-03-30 2008-10-02 Microsoft Corporation On-line gaming authentication
US20090119743A1 (en) * 2007-11-07 2009-05-07 Mcafee, Inc. Method and system for generic real time management of devices on computers connected to a network
US8484327B2 (en) * 2007-11-07 2013-07-09 Mcafee, Inc. Method and system for generic real time management of devices on computers connected to a network
US20100107213A1 (en) * 2008-10-23 2010-04-29 Microsoft Corporation Access Control State Determination Based on Security Policy and Secondary Access Control State
US8387109B2 (en) 2008-10-23 2013-02-26 Microsoft Corporation Access control state determination based on security policy and secondary access control state
US20110153576A1 (en) * 2009-12-22 2011-06-23 Daniel Figus Multi-Client Generic Persistence for Extension Fields
US8805864B2 (en) 2009-12-22 2014-08-12 Sap Ag Multi-client generic persistence for extension fields
US8224828B2 (en) 2009-12-22 2012-07-17 Sap Ag Multi-client generic persistence for extension fields
US20110321154A1 (en) * 2010-06-25 2011-12-29 Sap Ag Systems and methods for generating constraints for use in access control
US8381285B2 (en) * 2010-06-25 2013-02-19 Sap Ag Systems and methods for generating constraints for use in access control
US9304956B2 (en) 2010-06-30 2016-04-05 Intel Corporation Interrupt blocker
US8549201B2 (en) * 2010-06-30 2013-10-01 Intel Corporation Interrupt blocker
US20120005387A1 (en) * 2010-06-30 2012-01-05 Sedayao Jeffrey C Interrupt blocker
US20130031120A1 (en) * 2011-07-25 2013-01-31 Luca Passani System and Method for using a Device Description Repository
US9547727B2 (en) * 2011-07-25 2017-01-17 Scientiamobile, Inc. System and method for using a device description repository
US9058404B2 (en) 2011-07-25 2015-06-16 Scientiamobile, Inc. System and method for using a device description repository
KR101699874B1 (en) 2012-03-28 2017-01-25 인텔 코포레이션 Conditional limited service grant based on device verification
US20130337777A1 (en) * 2012-03-28 2013-12-19 Steven W. Deutsch Conditional limited service grant based on device verification
KR20160119265A (en) * 2012-03-28 2016-10-12 인텔 코포레이션 Conditional limited service grant based on device verification
US9338656B2 (en) * 2012-03-28 2016-05-10 Intel Corporation Conditional limited service grant based on device verification
WO2013147757A1 (en) * 2012-03-28 2013-10-03 Intel Corporation Conditional limited service grant based on device verification
US20130290851A1 (en) * 2012-04-30 2013-10-31 Microsoft Corporation User interface web services
CN103634271A (en) * 2012-08-21 2014-03-12 腾讯科技(深圳)有限公司 An authority control system, an apparatus and an authority control method for a network request
US11204952B2 (en) * 2012-12-28 2021-12-21 Microsoft Technology Licensing, Llc Detecting anomalies in behavioral network with contextual side information
US11372990B2 (en) 2013-12-23 2022-06-28 Dropbox, Inc. Restricting access to content
US20150178516A1 (en) * 2013-12-23 2015-06-25 Dropbox, Inc. Restricting access to content
US9817987B2 (en) * 2013-12-23 2017-11-14 Dropbox, Inc. Restricting access to content
US10397852B2 (en) * 2014-02-12 2019-08-27 Alcatel Lucent Method for access resource management of mobile transceiver by base station transceiver and apparatus associated therewith
CN110192197A (en) * 2017-01-12 2019-08-30 霍尼韦尔国际公司 Identity is established by using certificate and trusts the technology to realize the guarantee of certified products equipment
US20230198962A1 (en) * 2019-12-10 2023-06-22 Winkk, Inc Method and apparatus for secure application framework and platform
US20220206961A1 (en) * 2020-12-28 2022-06-30 Lempel Mordkhai Architecture, system and methods thereof for secure computing using hardware security classifications
US20230094856A1 (en) * 2021-09-20 2023-03-30 Normalyze, Inc. Compact cloud access network based on role-to-resource detection with resource state change tracking and provenance
US11627155B1 (en) 2021-09-20 2023-04-11 Normalyze, Inc. Cloud infrastructure detection with resource path tracing
US11625499B1 (en) 2021-09-20 2023-04-11 Normalyze ,Inc. Cloud data attack detection query builder
US11611573B1 (en) 2021-09-20 2023-03-21 Normalyze, Inc. In-cloud and constant time scanners
US11695785B2 (en) 2021-09-20 2023-07-04 Normalyze, Inc. Cloud environment analytics using snapshotting
US11876813B2 (en) 2021-09-20 2024-01-16 Normalyze, Inc. Cloud data schema detection system
US11943240B2 (en) 2021-09-20 2024-03-26 Normalyze, Inc. Cloud data attack detection based on network vulnerability signatures in traced resource network paths
US11943241B2 (en) 2021-09-20 2024-03-26 Normalyze, Inc. Compact cloud access network based on role-to-resource detection with resource state change tracking and provenance

Also Published As

Publication number Publication date
US20080235811A1 (en) 2008-09-25
US7657946B2 (en) 2010-02-02

Similar Documents

Publication Publication Date Title
US7657946B2 (en) Method for device dependent access control for device independent web content
Ramesh et al. The Performance Evolution of Antivirus Security Systems in Ultra dense Cloud Server Using Intelligent Deep Learning
US8041955B2 (en) Grid mutual authorization through proxy certificate generation
US20080163339A1 (en) Dynamic Security Access
US11272030B2 (en) Dynamic runtime interface for device management
US20100242110A1 (en) Widget Security
US7725737B2 (en) System and methodology providing secure workspace environment
US9501628B2 (en) Generating a distrubition package having an access control execution program for implementing an access control mechanism and loading unit for a client
KR101150128B1 (en) Method and system for merging security policies
US8667578B2 (en) Web management authorization and delegation framework
CA3023472A1 (en) Hardware-based virtualized security isolation
US10757079B2 (en) Method and system for controlling remote session on computer systems using a virtual channel
US20010013096A1 (en) Trusted services broker for web page fine-grained security labeling
US20100024036A1 (en) System and Methods Providing Secure Workspace Sessions
US20100175113A1 (en) Secure System Access Without Password Sharing
US8805972B1 (en) Multi-platform operational objective configurator for computing devices
JP2009512959A (en) Operating system independent data management
WO2022224262A1 (en) Cybersecurity system
JP2010026662A (en) Information leakage prevention system
US7996674B2 (en) LDAP user authentication
US9081720B2 (en) Information processing apparatus, setting information management method and recording medium
US20140108670A1 (en) Techniques for Dynamic Access Control of Input/Output Devices
US7950000B2 (en) Architecture that restricts permissions granted to a build process
US7178165B2 (en) Additional layer in operating system to protect system from hacking
JP2006202259A (en) Information processing system and method, and information processing program

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAN, SHUNGUO;REEL/FRAME:016416/0353

Effective date: 20050406

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE