Class / Patent application number | Description | Number of patent applications / Date published |
707786000 | Hierarchical access control | 14 |
20100082687 | DOCUMENT MANAGEMENT SYSTEM, DOCUMENT PRODUCING APPARATUS, DOCUMENT USE MANAGING APPARATUS, AND COMPUTER READABLE MEDIUM - A document management system includes: a document producing apparatus including a protected document producing unit; and a document use managing apparatus including: a document information storage; a document information registering unit; a use restriction information storage; and a use restriction information registering unit. | 04-01-2010 |
20110153671 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD AND COMPUTER READABLE MEDIUM - An information processing apparatus includes a creation unit and a registration unit. The creation unit acquires first limited use information which is associated with a designated object and stored in an object storage unit from the object storage unit in accordance with an instruction to specify the designated object, and creates second limited use information containing information indicated by the acquired first limited use information and described in a different form from the acquired first limited use information. The registration unit registers the second limited use information created by the creation unit in a second limited use storage unit. | 06-23-2011 |
20120150912 | HIERARCHICAL MULTI-TENANCY MANAGEMENT OF SYSTEM RESOURCES IN RESOURCE GROUPS - Exemplary method, system, and computer program embodiments for establishing hierarchical user management authority for storage resources organized into a plurality of resource groups in a computing storage environment are provided. In one embodiment, each of the plurality of storage resources is associated with a resource group object having a resource group attribute associating the resource group object with one of the plurality of resource groups. The resource group label attribute is assigned to the resource group object. An additional attribute of the resource group object, that specifies a plurality of management policies for the resource group object and the plurality of storage resources associated with the resource group object, is defined. One of plurality of available users of the plurality of storage resources is associated with a user resource scope attribute. A schema is defined for comparing of a plurality of values of the user resource scope attribute with the resource group label attribute. | 06-14-2012 |
20130036142 | APPLICATION UPDATE SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT - In accordance with embodiments, there are provided mechanisms and methods for storing documents that are being tracked in an on-demand service. These mechanisms and methods for storing documents in an on-demand service can enable embodiments to provide the sharing of documents and the storing of the documents in association with a tag. The ability of embodiments to provide the sharing of documents and the storing can enable an efficient searching for a shared document. In an embodiment, the shared document is categorized upon being stored. | 02-07-2013 |
20130246476 | VISUALIZATION OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 09-19-2013 |
20130246477 | VISUALIZATOIN OF ACCESS PERMISSION STATUS - Queries regarding access permissions of users and rights to directories in a complex enterprise are executed in near real-time, using lookups to tables that form a condensed database maintained for each file server. User information is condensed by arranging users in user groups having common data access rights. Directory permissions storage is condensed by showing only distinctive permissions to a directory in a table entry, and referencing inherited permissions of parent directories. The tables indicate recursive and ancestral relationships among the user groups and directories. They are developed and updated in advance of any queries. A consolidated view of the query results is presented on a single display screen. Using the tables results can be obtained without exhaustive searches of large file system tables. | 09-19-2013 |
20140115006 | DATABASE HIERARCHICAL INHERITANCE - A database system comprising a plurality of access keys stored in a first data memory device sector, each access key associated with a node value stored in a second data memory device sector. An access key processor configured to receive an input value and return the associated node value for the input value if the input value matches an access key stored in the first data memory device sector. The access key processor is configured to generate a revised input value if the input value does not match an access key stored in the first data memory device; a default node value stored in the second data memory device sector and associated with a portion of the input value, wherein the access key processor is configured to return the default node value as part of the revised input value. | 04-24-2014 |
20140297689 | HIERARCHICAL MULTI-TENANCY MANAGEMENT OF SYSTEM RESOURCES IN RESOURCE GROUPS - Establishing hierarchical user management authority for storage resources organized into resource groups in a computing storage environment are provided. Each storage resource is associated with a resource group and storage resource object having a resource group attribute associating the storage resource object with one of the resource groups. The resource group label attribute is assigned to the resource group object. An additional attribute of the resource group object, that specifies management policies for the resource group object and the storage resources associated with the resource group object, is defined. One of the available users of the storage resources is associated with a user resource scope attribute. A schema is defined for comparing of values of the user resource scope attribute with the resource group label attribute. The resource group label attribute is designated as a delimited text string for assigning the resource group label attribute to the resource group object. | 10-02-2014 |
20140337386 | INTERNAL FOLDER SHARING - A method and system of sharing a folder in a file system between an owner and a grantee is provided. An indication of a folder to share with a grantee may be received from the owner. The folder to share may be a subfolder within a parent folder, the parent folder not shared with the grantee. Then, sharing permissions indicating a level of access the grantee has to the folder may be stored with the folder. A virtual folder corresponding to the folder to share may be created on a device of the grantee. The virtual folder maps to all objects within the folder to share and may be stored at a level equal to parent folders of a file hierarchy on device of the grantee. | 11-13-2014 |
20140365527 | Secure access to hierarchical documents in a sorted, distributed key/value data store - Policy-based, cell-level access control is provided in association with a sorted, distributed key-value data store. As data representing a hierarchical document is ingested into the data store, the data is interpreted to identify fields and any sub-fields in the document, each identified field and its associated protection level as identified are translated into a set of one or more fieldname and visibility label pairs. Each fieldname and visibility label pair has a fieldname identifying a field and its zero or more sub-fields, together with a visibility label that is a function of the associated protection levels of the field and any sub-fields therein. At query time, and in response to receipt of a query including an authorization label, the fieldname and visibility labels are applied against the authorization label in the query to control which fields in the document are retrieved and used to generate the response to the query. | 12-11-2014 |
20150339404 | INFERRING SENIORITY LEVEL OF A MEMBER OF AN ON-LINE SOCIAL NETWORK - An inferred seniority system, in one example embodiment, may be configured to determine seniority levels for member profiles maintained by an on-line social network system, based on information stored in the member profiles, and also based on a hierarchical structure termed a seniority pyramid. The system may first determine seniority labels for each of the profiles in a group of member profiles based on information in respective member profiles. The system then determines, for groups of profiles that are given their respective seniority labels, percentages of profiles associated with respective seniority labels. Respective seniority levels for the groups of profiles are determined based on respective percentages of profiles associated with respective seniority labels and the percentage ranges associated with seniority levels that are stored in the seniority pyramid structure. | 11-26-2015 |
20150370824 | IDENTIFYING UNUSED PRIVILEGES IN A DATABASE SYSTEM - Techniques for identifying unused privileges are provided. Database accesses are monitored to generate privilege usage data. Privilege usage data for each database access may indicate a user, a utilized privilege, an object that is the target of the privilege, and a role to which the privilege is granted. The privilege usage data is compared to database authorization data that indicates all (or a subset) of granted privileges. A result of the comparison is unused privilege data that indicates what granted privileges were not utilized. A role graph may be generated that indicates one or more privileges that were utilized and one or more privileges that were not utilized along with role paths providing the privileges. | 12-24-2015 |
20160098574 | SYSTEMS AND METHODS TO MANAGE FILE ACCESS - A file system configured to use tags to control operations on files stored in the system. Each tag is usable to tag one or more of the files stored in the system and/or one or more other tags in the system. Each tag identifies one or more privileges for a user of the tag to operate on tagged files. Tags are sharable in the system for use by various users, which may create tags, modify tags, share tags, apply tags to selected tags and/or files in the system, and follow chains of tagging to access tagged files. The chains of tagging may include loops/circles in a graph of tags in the system. | 04-07-2016 |
20160117345 | Service Requirement Analysis System, Method and Non-Transitory Computer Readable Storage Medium - A service requirement analysis system includes a service provider database and an analysis server. The service provider database stores multiple service provider data entries, and is connected to a client device. The analysis server receives a service requirement string, and performs segmentation and filtering to obtain requirement keywords. The correlation values quantifying semantic relatedness between any two of the requirement keywords are calculated to construct a requirement keyword connected graph for dividing the requirement keywords into one or more requirement keyword groups associated with one or more concepts in the service requirement string. A semantic hierarchical structure of each of the requirement keyword groups is constructed for searching the service provider database to obtain service provider data entries matching the service requirement string. The matched entries are displayed on the client device. | 04-28-2016 |