Unlock instant, AI-driven research and patent intelligence for your innovation.

Enterprise entitlement framework

A technology of permissions and permission objects, applied in the field of flexible frameworks

Active Publication Date: 2013-03-06
埃森哲国际责任有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when new applications and / or databases are added to the rights management system, LDAP solutions typically require additional programming and / or development to accommodate the new applications and / or databases
In addition, the LDAP solution may also require further modification and / or reconfiguration in response to upgrades and / or reconfiguration of applications currently managed by the LDAP solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise entitlement framework
  • Enterprise entitlement framework
  • Enterprise entitlement framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] [20] In the various embodiments described below, reference is made to the accompanying drawings which form a part hereof, and in which there are shown various ways in which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present invention.

[0021] [twenty one] figure 1 The illustration illustrates a computing environment in which one or more aspects described herein may be implemented. A computing device such as computer 100 may contain multiple components for input, output, storage and processing of data. For example, processor 105 may perform a number of tasks including executing one or more applications, retrieving data from a storage device such as storage 115 , and / or outputting data to a device such as display 120 . Processor 105 may be connected to a Random Access Memory (RAM) module 110 for temporarily storing applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for managing privilege information across multiple applications and / or databases is provided. A flexible and extensible enterprise entitlement framework may be implemented to store and manage various types of privileges, access rights and resources. The enterprise entitlement framework may include a variety of data objects and structures configured to store various components and / or aspects of a privilege. The data objects may include resource type objects, user objects, role objects, action objects, resource attribute objects, list item object and / or hierarchy objects. The data objects defined for a particular privilege may further be linked according to relationships between one or more objects. The enterprise entitlement framework is extensible for use with new applications by defining new objects compatible with the privilege structures of the new applications.

Description

technical field [0001] [01] The present invention relates generally to computer security. In particular, the present invention relates to a flexible framework for managing user rights across multiple applications on a computer system or network. Background technique [0002] [02] Access to information, applications, and other types of resources is generally controlled based on permissions assigned to users and / or devices. For example, permissions can define the level of security clearance that a user and / or device must have or meet to access a particular resource. Therefore, if an application requires the highest security permission, the user who wants to access and / or use the application and / or its functions must have the highest security permission. Similarly, access to one or more portions of a company's financial data may be controlled by user titles and / or hierarchies defined within the company or within the company's organizational chart. For example, access to the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62H04L29/06
CPCG06F2221/2145G06F21/6218G06F2221/2101G06F21/604H04L63/20Y10S707/99932Y10S707/99939Y10S707/9994Y10S707/99944Y10S707/99945Y10S707/99946Y10S707/99947
Inventor M·R·谢伊S·A·阿尔菲里A·A·摩塔
Owner 埃森哲国际责任有限公司