Dynamically configurable distributed security system

a distributed security system and dynamic configuration technology, applied in the field of distributed security systems, can solve the problems of incompatibility of security information and security procedures from one portion of an enterprise application with other portions, inability to take into account security models, and inability to collect services incompatible security silos

Inactive Publication Date: 2005-04-14
BEA SYST INC
View PDF99 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, ensuring the security of such services is seen as a barrier to their wide-spread adoption.
Thus, the security information and security procedures from one portion of an enterprise application may not be compatible with other portions.
Furthermore, some security models may not take into account that users can have different policies depending on when and how they are interacting with a service.
The result is a collection of services having incompatible silos of security.
Another reason why security remains a barrier to deploying web services is cost.
Even if this were not so, legacy applications not designed for dynamic changes in policy can require that security measures be intricately tied to the application itself.
This leads to a security systems that are brittle and costly to maintain.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamically configurable distributed security system
  • Dynamically configurable distributed security system
  • Dynamically configurable distributed security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

The invention is illustrated by way of example and not by way of limitation in the figures of the accompanying drawings in which like references indicate similar elements. References to embodiments in this disclosure are not necessarily to the same embodiment, and such references mean at least one.

In the following description, numerous specific details are set forth to provide a thorough description of the invention. However, it will be apparent to one skilled in the art that the invention may be practiced without these specific details. In other instances, well-known features have not been described in detail so as not to obscure the invention.

In various embodiments, systems and methods disclosed herein provide an approach to security for enterprise-wide applications while allowing for simple integration with third party security products. Security can be administered and controlled through flexible policies. The system can perform fine-grained, business transaction-based auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for a dynamically configurable security system, comprising, a security service module capable of dynamically instantiating one or more plugin security provider modules, the one or more security provider modules are coupled to the security service module wherein the one or more security provider modules are capable of responding dynamically to changes in configuration information, wherein the security service module is capable of receiving one or more security information updates, and wherein the security service module is capable of controlling access to one or more resources based on the one or more security information updates.

Description

COPYRIGHT NOTICE A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. INCORPORATION BY REFERENCE The following U.S. patent and U.S. patent Publications are hereby incorporated by reference in their entirety: U.S. Pat. No. 6,158,010 entitled SYSTEM AND METHOD FOR MAINTAINING SECURITY IN A DISTRIBUTED COMPUTER NETWORK, by Mark Moriconi et al,. filed Dec. 5, 2000. U.S. patent application Ser. No. 09 / 878,536, entitled SYSTEM AND METHOD FOR SERVER SECURITY AND ENTITLEMENT PROCESSING, by Paul Patrick, filed Jun. 11, 2001, now U.S. Patent Publication No. US2002-0188869, published on Dec. 12, 2002 (Attorney Docket No. BEAS-1084US0); FIELD OF THE DISCLOSURE The present disclosur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F11/30G06F15/173G06F21/00H04L9/00
CPCG06F21/6218H04L63/20H04L63/105
Inventor PATRICK, PAULBYRNE, DAVIDYAGEN, KENNETH D.XU, MINGDEHOWES, JASONFALCO, MARK A.RIENDEAU, RICHARD J.
Owner BEA SYST INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products