Patent application number | Description | Published |
20090198721 | COMPUTING RESOURCE SELECTION METHOD AND SYSTEM - A selection method and system. The method includes enabling, by a computing system for a requester, access to the computing system. The computing system comprises a memory system. The memory system comprises group based access control data and computing resource data organized based on an XML schema that comprises a recursive format used to support a plurality of branch levels in a resource tree. The computing system associates first group data of the group based access control data with the requester. The computing system receives from the requester, a first request for accessing the computing resource data. The computing system associates the first group data with a first group of computing resources of the computing resource data. The computing system generates a first list comprising attribute values for the first group of computing resources. The computing system stores the first list. | 08-06-2009 |
20090210421 | ACCESS CONTROL DECISION METHOD AND SYSTEM - An access control method and system. The method includes enabling, by a computing system for a requester, access to the computing system. The computing system comprises group based access control data and computing resource data organized based on an XML schema that comprises a recursive format used to support a plurality of branch levels in a resource tree. The computing system associates first group data of the group based access control data with the requester. The computing system receives a request from the requester to access the computing resource data. The computing system determines an access control decision associated with the request to access the computing resource data. The computing system presents the access control decision to the requester. | 08-20-2009 |
20090222665 | NON-INTERACTIVE ENTITY APPLICATION PROXY METHOD AND SYSTEM - A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The configuration data comprises a refresh count, a refresh period, and a session ID. A master refresh period is calculated from the refresh period. Credentials data associated with the NIE software application are retrieved. The credentials data are transmitted to a resource server. A session key generated by the resource server is received by the NIE software application. The NIE software application calculates a stale time associated with the session key. The NIE software application generates a first updated refresh count. The NIE software application stores the session key, the first updated refresh count, the first refresh period, and the first specified stale time. | 09-03-2009 |
20090234954 | SELECTABLE NON-INTERACTIVE ENTITY APPLICATION PROXY METHOD AND SYSTEM - A selectable security method and system. The method includes retrieving first configuration data associated with a non interactive entity (NIE) software application and second configuration data associated with a plurality of requesters. A master refresh period is calculated from the first configuration data and the second configuration data. Credentials data associated with the NIE software application are retrieved. The credentials data are transmitted to a resource server. A session key generated by the resource server is received by the NIE software application. The NIE software application calculates a stale time associated with the session key. The NIE software application stores the session key and the stale time. | 09-17-2009 |
20090235338 | RESOURCE BASED NON-INTERACTIVE ENTITY APPLICATION PROXY METHOD AND SYSTEM - A security method and system. The method includes retrieving configuration data associated with a non interactive entity (NIE) software application. The configuration data comprises refresh counts, refresh periods, and session IDs. A master refresh period is calculated from the refresh periods. Credentials data associated with a requestor are retrieved. The credentials data are transmitted to a resource server. A session key generated by the resource server is received by the NIE software application. The NIE software application calculates a stale time associated with the session key. The NIE software application generates a first updated refresh count. The NIE software application stores the session key, the first updated refresh count, the first refresh period, and the first specified stale time. | 09-17-2009 |
20090235343 | RESOURCE SERVER PROXY METHOD AND SYSTEM - A resource request method and system. The method includes receiving by resource server software application, session key life data. The resource server software application receives from a requester, an authentication request, a session ID, and an address associated with the requestor. The resource server software application transmits the session ID and a request for groups associated with the request. The resource server software application receives group IDs. The resource server software application generates a session key associated with the requester. The resource server software application calculates a specified lifetime associated with the session key. The resource server software application stores the session key, the session ID, the address, the group IDs, and the specified lifetime. The resource server software application transmits to the requester, the session key. | 09-17-2009 |
20090240727 | DATA MANIPULATION PROCESS METHOD AND SYSTEM - A data manipulation method and system. The method includes receiving by a computing system, a multiple data manipulation (MDM) list comprising data objects. The computing system includes a memory unit that comprises data. A data object of the data objects is reviewed. The computing system determines that a new item attribute for the data object comprises a value of null. The computing system determines that an original item attribute for the data object comprises a value of not null. The computing system generates and transmits to DELETE request command to the memory unit. The computing system deletes in response to the delete request command, a first portion of the data. | 09-24-2009 |
20090241125 | DATA MANIPULATION COMMAND METHOD AND SYSTEM - A data manipulation method and system. The method includes receiving and storing by a computing system, configuration data and a first list comprising first group of data objects. The computing system generates a second list associated with the first list. The second list comprises a second group of data objects associated with the first group of data objects. The computing system compares the first group to the second group to determine if any attribute values associated with the first group are equal to any associated attribute values associated with the second group. The computing system generates a third list based on the comparing and the configuration data. The third list comprises a third group of data objects associated with the first group and of data objects. The computing system stores the third list. | 09-24-2009 |