ATE481789T1 - Methode und system zur delegation der berechtigung mit beschränkten zugriffsrechten in einer umgebung zur online zusammenarbeit - Google Patents

Methode und system zur delegation der berechtigung mit beschränkten zugriffsrechten in einer umgebung zur online zusammenarbeit

Info

Publication number
ATE481789T1
ATE481789T1 AT05023556T AT05023556T ATE481789T1 AT E481789 T1 ATE481789 T1 AT E481789T1 AT 05023556 T AT05023556 T AT 05023556T AT 05023556 T AT05023556 T AT 05023556T AT E481789 T1 ATE481789 T1 AT E481789T1
Authority
AT
Austria
Prior art keywords
authority
participant
delegation
access rights
limited access
Prior art date
Application number
AT05023556T
Other languages
English (en)
Inventor
Yuecel Karabulut
Original Assignee
Sap Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sap Ag filed Critical Sap Ag
Application granted granted Critical
Publication of ATE481789T1 publication Critical patent/ATE481789T1/de

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
AT05023556T 2004-11-30 2005-10-27 Methode und system zur delegation der berechtigung mit beschränkten zugriffsrechten in einer umgebung zur online zusammenarbeit ATE481789T1 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/000,816 US8312526B2 (en) 2004-11-30 2004-11-30 Method and system for delegating authority with restricted access right in an online collaborative environment

Publications (1)

Publication Number Publication Date
ATE481789T1 true ATE481789T1 (de) 2010-10-15

Family

ID=35911103

Family Applications (1)

Application Number Title Priority Date Filing Date
AT05023556T ATE481789T1 (de) 2004-11-30 2005-10-27 Methode und system zur delegation der berechtigung mit beschränkten zugriffsrechten in einer umgebung zur online zusammenarbeit

Country Status (4)

Country Link
US (1) US8312526B2 (de)
EP (1) EP1662696B1 (de)
AT (1) ATE481789T1 (de)
DE (1) DE602005023572D1 (de)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9003295B2 (en) * 2003-03-17 2015-04-07 Leo Martin Baschy User interface driven access control system and method
US9176934B2 (en) 2005-05-06 2015-11-03 Leo Baschy User interface for nonuniform access control system and methods
US9129088B1 (en) 2005-06-04 2015-09-08 Leo Martin Baschy User interface driven access control system and methods for multiple users as one audience
US8700523B2 (en) * 2005-06-10 2014-04-15 American Express Travel Related Services Company, Inc. System and method for delegating management of a financial transaction account to a designated assistant
US9202068B2 (en) * 2006-03-29 2015-12-01 Leo M. Baschy User interface for variable access control system
US20080133551A1 (en) * 2006-11-30 2008-06-05 Ava Mobile, Inc. System, method, and computer program product for managing rights of media in collaborative environments
US8935528B2 (en) * 2008-06-26 2015-01-13 Microsoft Corporation Techniques for ensuring authentication and integrity of communications
US9449195B2 (en) * 2009-01-23 2016-09-20 Avow Networks Incorporated Method and apparatus to perform online credential reporting
US20120173874A1 (en) * 2011-01-04 2012-07-05 Qualcomm Incorporated Method And Apparatus For Protecting Against A Rogue Certificate
US9584558B2 (en) 2011-09-08 2017-02-28 Avaya Inc. Methods, apparatuses, and computer-readable media for initiating an application for participants of a conference
US9929869B2 (en) * 2011-10-26 2018-03-27 Avaya Inc. Methods, apparatuses, and computer-readable media for providing a collaboration license to an application for participant user device(s) participating in an on-line collaboration
US11250423B2 (en) * 2012-05-04 2022-02-15 Institutional Cash Distributors Technology, Llc Encapsulated security tokens for electronic transactions
US9514323B2 (en) * 2012-08-30 2016-12-06 Intelleflex Corporation RFID system with segmented RFID data ownership
US9344424B2 (en) * 2013-05-23 2016-05-17 Adobe Systems Incorporated Authorizing access by a third party to a service from a service provider
US9350556B1 (en) * 2015-04-20 2016-05-24 Google Inc. Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key
US10977353B2 (en) * 2018-09-18 2021-04-13 International Business Machines Corporation Validating authorized activities approved by a guardian
US11411746B2 (en) * 2019-05-24 2022-08-09 Centrality Investments Limited Systems, methods, and storage media for permissioned delegation in a computing environment
EP4174691B1 (de) * 2021-10-29 2024-08-07 Siemens Aktiengesellschaft Leitsystem für eine technische anlage und verfahren zum entfernen eines oder mehrerer zertifikate

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020156737A1 (en) * 1993-10-22 2002-10-24 Corporation For National Research Initiatives, A Virginia Corporation Identifying, managing, accessing, and tracking digital objects and associated rights and payments
US7353396B2 (en) * 1995-10-02 2008-04-01 Corestreet, Ltd. Physical access control
US5933503A (en) * 1996-03-15 1999-08-03 Novell, Inc Controlled modular cryptography apparatus and method
US6105131A (en) * 1997-06-13 2000-08-15 International Business Machines Corporation Secure server and method of operation for a distributed information system
US6233577B1 (en) * 1998-02-17 2001-05-15 Phone.Com, Inc. Centralized certificate management system for two-way interactive communication devices in data networks
US6751735B1 (en) * 1998-03-23 2004-06-15 Novell, Inc. Apparatus for control of cryptography implementations in third party applications
US7039805B1 (en) * 1998-05-20 2006-05-02 Messing John H Electronic signature method
US6138235A (en) * 1998-06-29 2000-10-24 Sun Microsystems, Inc. Controlling access to services between modular applications
US6324645B1 (en) * 1998-08-11 2001-11-27 Verisign, Inc. Risk management for public key management infrastructure using digital certificates
US6643774B1 (en) * 1999-04-08 2003-11-04 International Business Machines Corporation Authentication method to enable servers using public key authentication to obtain user-delegated tickets
US7213262B1 (en) * 1999-05-10 2007-05-01 Sun Microsystems, Inc. Method and system for proving membership in a nested group using chains of credentials
GB2357228B (en) 1999-12-08 2003-07-09 Hewlett Packard Co Method and apparatus for discovering a trust chain imparting a required attribute to a subject
US6754829B1 (en) * 1999-12-14 2004-06-22 Intel Corporation Certificate-based authentication system for heterogeneous environments
US7058798B1 (en) * 2000-04-11 2006-06-06 Sun Microsystems, Inc. Method ans system for pro-active credential refreshing
US7313692B2 (en) * 2000-05-19 2007-12-25 Intertrust Technologies Corp. Trust management systems and methods
US6807577B1 (en) * 2000-09-14 2004-10-19 International Business Machines Corporation System and method for network log-on by associating legacy profiles with user certificates
US7356690B2 (en) * 2000-12-11 2008-04-08 International Business Machines Corporation Method and system for managing a distributed trust path locator for public key certificates relating to the trust path of an X.509 attribute certificate
US7415607B2 (en) * 2000-12-22 2008-08-19 Oracle International Corporation Obtaining and maintaining real time certificate status
US7085834B2 (en) * 2000-12-22 2006-08-01 Oracle International Corporation Determining a user's groups
US6952428B1 (en) * 2001-01-26 2005-10-04 3Com Corporation System and method for a specialized dynamic host configuration protocol proxy in a data-over-cable network
US20020144108A1 (en) * 2001-03-29 2002-10-03 International Business Machines Corporation Method and system for public-key-based secure authentication to distributed legacy applications
AU2002324620A1 (en) * 2001-08-06 2003-02-24 Certco, Inc. System and method for trust in computer environments
US7571314B2 (en) 2001-12-13 2009-08-04 Intel Corporation Method of assembling authorization certificate chains
US7770212B2 (en) * 2002-08-15 2010-08-03 Activcard System and method for privilege delegation and control
US7318155B2 (en) * 2002-12-06 2008-01-08 International Business Machines Corporation Method and system for configuring highly available online certificate status protocol responders
US7444509B2 (en) * 2004-05-27 2008-10-28 International Business Machines Corporation Method and system for certification path processing

Also Published As

Publication number Publication date
US8312526B2 (en) 2012-11-13
EP1662696A1 (de) 2006-05-31
US20060117382A1 (en) 2006-06-01
DE602005023572D1 (de) 2010-10-28
EP1662696B1 (de) 2010-09-15

Similar Documents

Publication Publication Date Title
ATE481789T1 (de) Methode und system zur delegation der berechtigung mit beschränkten zugriffsrechten in einer umgebung zur online zusammenarbeit
ATE481790T1 (de) Methode und system zur delegation der berechtigung in einer umgebung zur online zusammenarbeit
CA2657406C (en) Controlling the delegation of rights
ATE520088T1 (de) Verfahren zur verwaltung der gleichzeitigen modifikation von datenbankobjekten während der entwicklung
ATE554586T1 (de) Verfahren und vorrichtung zur verwaltung von einem gleichrangigen system mit zusammenarbeit
ATE501583T1 (de) Verfahren und vorrichtung zur bestimmung einer authentifikationsprozedur
DE60112227D1 (de) Verfahren und vorrichtung zur sicheren datenverteilung
DE602008000692D1 (de) Verfahren und Fernsteuerungssystem zur Erzeugung einer benutzerdefinierten Server-Infrastruktur in Echtzeit
WO2006132849A3 (en) System and method for controlling brand integrity in a network environment
Kerschbaum et al. Security architecture for virtual organizations of business web services
CN106506500A (zh) 一种基于saml和xacml的云计算统一身份认证的方法
Veit et al. Protected areas and property rights: democratizing eminent domain in East Africa
Vandenbroucke The Evolution of Codes of Conduct to Ensure Labor Rights in Global Supply Chains
Uppaluri Enterprise Authentication Architectures: Comparing Kerberos, Active Directory, And Okta for Cloud Data Platforms
Hrdinová et al. Designing social media policy for government
Cochran et al. Identity and Access Management
Hühnlein et al. Options for integrating eID and SAML
Andriamamonjy et al. Integrating digital building logbooks with the Solid specification for enhanced data privacy and management
Barton et al. A security incident response trust framework for federated identity (sirtfi)
Yunus et al. Amendment to the Constitution of the Russian Federation as Putin's Political Communication Force
Jabba et al. Sodium channel activator‐stimulated neuronal development involves BDNF‐TrkB signaling
Turner Captive Care Legislation and Regulations
Landau RFC 8657 Certification Authority Authorization (CAA) Record Extensions for Account URI and Automatic Certificate Management Environment (ACME) Method Binding
Proskocil et al. Organophosphorus Pesticides Stimulate Macrophages to Release Factors That Modulate M2 Muscarinic Receptors
Devinney et al. Spinal A2A receptor inhibition reveals phrenic motor facilitation following moderate sustained hypoxia

Legal Events

Date Code Title Description
RER Ceased as to paragraph 5 lit. 3 law introducing patent treaties