Method and apparatus for an improved security system mechanism in a business applications management system platform
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-01730
G06F-00946
G06F-01760
G06F-01214
H04L-02906
출원번호
US-0759062
(2001-01-12)
발명자
/ 주소
Lipkin, Daniel S.
Mehra, Gaurav
출원인 / 주소
Saba Software, Inc.
대리인 / 주소
Morrison &
인용정보
피인용 횟수 :
107인용 특허 :
27
초록▼
The present invention provides a solution to the needs described above through an improved method and apparatus for an improved security system mechanism in a business applications management system platform. The security management system partitions a number of business objects into a number of hie
The present invention provides a solution to the needs described above through an improved method and apparatus for an improved security system mechanism in a business applications management system platform. The security management system partitions a number of business objects into a number of hierarchical domains. A security list is then created and configured to grant a member the right to perform a security operation on the business object located within the hierarchical domain. The security list is created by adding the security operation to the security list, applying the security operation to one of the multiple domains, and adding members to the security list.
대표청구항▼
1. A method for managing security on a business application management platform implemented on a computer, comprising the steps of:partitioning a plurality of business objects into a hierarchy of domains; and creating a security list configured to grant a member the right to perform a security opera
1. A method for managing security on a business application management platform implemented on a computer, comprising the steps of:partitioning a plurality of business objects into a hierarchy of domains; and creating a security list configured to grant a member the right to perform a security operation on a business object located in said hierarchy of domains, comprising the steps of: adding said security operation to said security list; applying said security operation to a given domain and to each child domain of the given domain; and adding said member to said security list. 2. The method of claim 1, wherein said partitioned business objects are grouped together in specific categories and/or classes.3. The method of claim 2, wherein said security operation is performed on said category or class of business objects.4. The method of claim 1, wherein the right to perform said security operation is shared by more than one member.5. The method of claim 1, wherein said security operation is assigned based on a customizable partitioning of said business objects into said plurality of hierarchical domains.6. The method of claim 1, wherein said security operation is predefined to apply to all of said business objects located in said plurality of hierarchical domains.7. The method of claim 1, wherein said security operation represents a group of one or more security operations.8. The method of claim 1,wherein said partitioned business objects are grouped together in specific categories and/or classes; and wherein at least one category and/or class of business objects defines additional security operations that can be performed on said business objects within said at least one category and/or class of business objects. 9. The method of claim 1, wherein said domains are partitioned based on geography, divisions, and/or business function.10. The method of claim 1, wherein said security list is a global security list configured to apply across said hierarchy of domains.11. The method of claim 1, wherein said member is an individual user, associated with a generic role, and/or associated with an automated process.12. A computer security management system for managing security on a business application management platform, comprising:a partitioning mechanism configured to partition a plurality of business objects into a hierarchy of domains; a security list mechanism configured to create a security list, said security list comprising: a security operation, wherein said security operation is applied to at least one of said plurality of domains and to all of the child domains of the at least one domain; and a member, wherein said security list grants said member the right to perform said security operation in the at least one domain and in all of the child domains of the at least one domain. 13. The system of claim 12, wherein said partitioned business objects are grouped together in specific categories or classes.14. The system of claim 13, wherein said security operation is performed on said category or class of business objects.15. The system of claim 12, wherein the right to perform said security operation is shared by more than one member.16. The system of claim 12, wherein said security operation is assigned based on a customizable partitioning of said business objects into said hierarchy of domains.17. The system of claim 12, wherein said security operation is predefined to apply to all of said business objects located in said hierarchy of domains.18. The system of claim 12, wherein said security operation represents a group of one or more security operations.19. The system of claim 12,wherein said partitioned business objects are grouped together in specific categories and/or classes; and wherein at least one category and/or class of business objects defines additional security operations that can be performed on said business objects within said at least one category and/or class of business objects. 20. The system of claim 12, wherein said domains are partitioned based on geography, divisions, and/or business function.21. The system of claim 12, wherein said security list is a global security list and is configured to apply across said hierarchy of domains.22. The system of claim 12, wherein said member is an individual user, associated with a generic role, and/or associated with an automated process.23. A computer-readable storage medium containing computer executable code for implementing a security management system for managing security on a business application management platform by instructing a computer to operate as follows:partition a plurality of business objects into a hierarchy of domains; create a security list by further instructing the computer to operate as follows: add a security operation to said security list; apply said security list to at least one of said plurality of domains and to all child domains of the at least one domain; and add said member to said security list, wherein said security list is configured to grant a member the right to perform said security operation in each domain to which it has been applied. 24. The computer-readable storage medium of claim 23, wherein said partitioned business objects are grouped together in specific categories or classes.25. The computer-readable storage medium of claim 24, wherein said security operation is performed on said category or class of business objects.26. The computer-readable storage medium of claim 23, wherein the right to perform said security operation is shared by more than one member.27. The computer-readable storage medium of claim 23, wherein said security operation is assigned based on a customizable partitioning of said business objects into said hierarchy of domains.28. The computer-readable storage medium of claim 23, wherein said security operation is predefined to apply to all of said business objects located in each domain.29. The computer-readable storage medium of claim 23, wherein said security operation represents a group of one or more security operations.30. The computer-readable storage medium of claim 23,wherein said partitioned business objects are grouped together in specific categories and/or classes; and wherein at least one category and/or class of business objects defines additional security operations that can be performed on said business objects within said at least one category and/or class of business objects. 31. The computer-readable storage medium of claim 23, wherein said domains are partitioned based on geography, divisions, and/or business function.32. The computer-readable storage medium of claim 23, wherein said security list is a global security list and is configured to apply across said hierarchy of domains.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (27)
Srinivasan Seshan R. (1524 Condor Way Sunnyvale CA 94087), Automated, electronic network based, project management server system, for managing multiple work-groups.
Steinberg Steven G. (New York NY) Zucker Elizabeth A. (New York NY) Arvanitis Yannis S. (Chicago IL) Bakshi Anil R. (Bogota NJ) Olenich Matthew W. (New York NY) Werner Thomas G. (Jersey City NJ) Long, Computer-assisted software engineering system for cooperative processing environments.
Jannette Daniel A. ; Allen Edwin M. ; Burnard Mark F. ; Crenshaw Jamie L. ; DeSaele Curtis R. ; Hill Michael E. ; Morrison Gerald O. ; Raheja Sonia ; Szuch William G. ; Vickers Paul W. ; Zaun Mark S., Design and engineering project management system.
Loftin R. Bowen (Houston TX) Wang Lui (Friendswood TX) Baffes Paul T. (Houston TX) Hua Grace C. (Webster TX), General purpose architecture for intelligent computer-aided training.
Daniels Dan B. (San Diego CA) Olps Darrell M. (Poway CA) Reese Carl G. (San Diego CA) Rahlfs Tom R. (Encinitas CA) Carlton Ronald R. (San Marcos CA), Instructional management system.
Bloom Charles P. (Superior CO) Bell Brigham R. (Boulder CO) Linton ; Jr. Franklyn N. (Woburn MA) Haines Mark H. (Arvada CO) Norton Edwin H. (Northglenn CO), Intelligent tutoring method and system.
Lee John R. (912 Constantinople St. New Orleans LA 70115) Alvendia John (Metairie LA), Interactive computer aided natural learning method and apparatus.
Heindel Lee Edward (Bernardsville NJ) Kasten Vincent Alan (Fanwood NJ) Schlieber Karl Johannes (Flemington NJ), Methods and apparatus for managing information on activities of an enterprise.
Behram Sepehr (Hampton VA) Grauzlis Nancy T. (Hampton VA) Joseph Sammy W. (Derwood MD), Privacy protected information medium using a data compression method.
Ostby David L. (20631 - 303rd SE. Issaquah WA) Marihugh Shari (20631 - 303rd SE. Maple Valley WA 98038) Ostby Paul S. (Kirkland WA), System and method for assessing an individual\s task-processing style.
Wolters ; Jr. Richard Arthur ; Schwee Susan Mae ; Isaacs James Russell,CHX ; Smith Michael Adrian ; Cooley ; Jr. Walter Hening ; Leighty Craig Ernest ; Borst George ; Mayo Paul Lawrence ; Lownes Greg, System for managing multiple projects of similar type using dynamically updated global database.
Kini, Prashanth; Tauriello, Richard; Campos, Marcos M.; Milenova, Boriana; Lubomirsky, Andres V.; Sum, Charlie, Continuous system health indicator for managing computer system alerts.
Mortensen, Douglas R.; Mortensen, Richard W.; Morel, Michael J.; Plaisted, Patrick E., Customization of metadata describing objects in a computing environment.
Plaisted, Patrick E.; Morel, Michael J.; Mortensen, Richard W.; Mortensen, Douglas R.; Pinkston, Jeffery S.; Anonsen, Steven P.; Brookins, Timothy J., Customization of process logic in a software system.
Grewal, Jasbir; Pyreddy, Pallavi; Vipranarayanan, Praveen; Yin, Siu Wan Surlina, Goal and performance management performable at unlimited times and places.
Kon, Takayasu; Kamada, Yasunori; Sako, Yoichiro, Information processing apparatus, information providing method, program, and information providing system.
Pollinger, Thomas, Method and apparatus for mapping structured query language schema to application specific business objects in an integrated application environment.
Bommireddipalli, Vijay R.; Brodsky, Stephen A.; Chang, David W.; Dawra, Anshul; Horman, Randall W.; Leung, Tony K.; Ostler, Paul A., Method and system for centralized control of database applications.
Bommireddipalli, Vijay R.; Brodsky, Stephen Andrew; Chang, David Wei-Jye; Dawra, Anshul; Horman, Randall William; Leung, Tony Kai-chi; Ostler, Paul Arnold, Method and system for centralized control of database applications.
Saimi,Akihiro; Syomura,Tsutomu; Suganuma,Hiroshi; Nanbu,Hidetoshi, Method for developing Web applications, development support system and storage medium for storing programs developed according to the method.
Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
Jones, Carol Ann; McGowan, Patrick; Paul, Christopher Joseph; Ramaswamy, Shankar; Wong, Cesar A., Methods, systems and computer program products for creating user interface to applications using generic user interface templates.
Lucco, Steven E.; Christensen, Erik B.; Layman, Andrew J.; Levin, David E.; Lovering, Bradford H.; Nielsen, Henrik Frystyk; Shewchuk, John P., Resolving virtual network names.
Gerber, Robert H.; Knight, Holly; Krishnan, Murali R.; Nilakantan, Niranjan; Abileah, Shahaf; Pather, Shyamalan, System and method for preference application installation and execution.
Blakeley,Jose A.; Zhang,Hongang; Rathakrishnan,Balaji; Venkatesh,Ramachandran; Sezgin,Beysim; Boukouvalas,Alexios; Galindo Legaria,Cesar A.; Carlin,Peter A., System and method for providing user defined aggregates in a database system.
Venkatesh, Ramachandran; Fang, Jun; Blakeley, Jose A.; Sezgin, Beysim; Rathakrishnan, Balaji; Carlin, Peter A., System and method for providing user defined types in a database system.
Dart, Scott E.; Gibson, Bradley P.; Evans, Christopher A.; Hellyar, Paul S.; Vaschillo, Alexander; Platt, John C.; Glenner, Steve C.; Ballou, Nathaniel H., Systems and methods for the implementation of a digital images schema for organizing units of information manageable by a hardware/software interface system.
Shah, Ashish, Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system.
Shah, Ashish, Systems and methods for the implementation of a synchronization schemas for units of information manageable by a hardware/software interface system.
Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Lucco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Lucco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Lucco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
Della-Libera, Giovanni M.; Kaler, Christopher G.; Konersmann, Scott A.; Lampson, Butler W.; Leach, Paul J.; Lovering, Bradford H.; Luocco, Steven E.; Millet, Stephen J.; Rashid, Richard F.; Shewchuk, John P., Virtual distributed security system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.