Reference is made to U.S. patent application Ser. No. 13/014,762, filed Jan. 27, 2011, and entitled “AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEMS AND METHODS”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (1) and (2)(i).
Reference is also made to U.S. Provisional Patent Application Ser. No. 61/477,662, filed Apr. 21, 2011 and entitled “ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (4) and (5)(i).
Reference is also made to U.S. patent application Ser. No. 13/106,023, filed May 12, 2011, and entitled “AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENT SYSTEM AND METHOD”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (1) and (2)(i).
Reference is also made to U.S. patent application Ser. No. 13/159,903, filed Jun. 14, 2011, and entitled “ACCESS PERMISSIONS MANAGEMENT SYSTEM AND METHOD”, the disclosure of which is hereby incorporated by reference and priority of which is hereby claimed pursuant to 37 CFR 1.78(a) (1) and (2)(i).
Reference is also made to the following patents and patent applications, owned by assignee, the disclosures of which are hereby incorporated by reference:
U.S. Pat. Nos. 7,555,482 and 7,606,801;
U.S. Published Patent Application Nos. 2007/0244899, 2008/0271157, 2009/0100058, 2009/0119298; 2009/0265780; 2011/0010758; 2011/0060916; 2011/0061093; 2011/0061111 and 2011/0184989;
U.S. patent application Ser. Nos. 12/861,059; 12/861,953; 13/106,023 and 13/159,903; and
PCT Applications PCT/IL2011/000409 and PCT/IL2011/000408.
The present invention relates to data management generally and more particularly access permissions management.
The following patent publications are believed to represent the current state of the art:
U.S. Pat. Nos. 5,465,387; 5,899,991; 6,338,082; 6,393,468; 6,928,439; 7,031,984; 7,068,592; 7,403,925; 7,421,740; 7,555,482, 7,606,801 and 7,743,420; and
U.S. Published Patent Application Nos.: 2003/0051026; 2004/0249847; 2005/0108206; 2005/0203881; 2005/0086529; 2006/0064313; 2006/0184530; 2006/0184459; 2007/0203872; 2007/0244899; 2008/0271157; 2009/0100058; 2009/0119298 and 2009/0265780.
The present invention provides improved systems and methodologies for access permissions management.
There is thus provided in accordance with a preferred embodiment of the present invention in a hierarchical access permissions environment, a method for enabling efficient management of project-wise permissions including maintaining project-wise lists of network objects, access permissions to which cannot be managed together via a hierarchical folder structure and employing the project-wise lists of network objects to make project-wise changes in access permissions to the network objects without the need to individually modify access permissions to individual ones of the network objects.
In accordance with a preferred embodiment of the present invention maintaining project-wise lists of network objects includes generating at least one project-wise list of plural ones of the network objects. Preferably, maintaining project-wise lists of network objects also includes mapping access permissions of the plural ones of the network objects onto the at least one project-wise list. Preferably, maintaining project-wise lists of network objects also includes merging access permissions of plural ones of first network objects of a first project-wise list with access permissions of corresponding plural ones of second network objects of a second project-wise list.
In accordance with a preferred embodiment of the present invention the network objects are stored on disparate computers. In accordance with a preferred embodiment of the present invention at least some of the disparate computers are operated by different computer operating systems. In accordance with a preferred embodiment of the present invention the network objects include inter-related subject matter.
Preferably, the network objects are owned by a common owner.
There is also provided in accordance with another preferred embodiment of the present invention in a hierarchical access permissions environment, a project management system for enabling efficient management of project-wise permissions including a project-wise lists management (PWLM) subsystem maintaining project-wise lists of network objects, access permissions to which cannot be managed together via a hierarchical folder structure and a user interface allowing an owner of a project-wise list of network objects to make project-wise changes in access permissions to the network objects without the need to individually modify access permissions to individual ones of the network objects.
In accordance with a preferred embodiment of the present invention the project-wise lists management (PWLM) subsystem includes a project-wise list generator which generates at least one project-wise list of plural ones of the network objects. Preferably, the project-wise lists management (PWLM) subsystem also includes an access permissions mapping generator which maps access permissions of the plural ones of the network objects onto the at least one project-wise list. Preferably, the project-wise lists management (PWLM) subsystem also includes project-wise lists merging functionality which is operative to merge access permissions of plural ones of first network objects of a first project-wise list with access permissions of corresponding plural ones of second network objects of a second project-wise list.
In accordance with a preferred embodiment of the present invention the network objects are stored on disparate computers. In accordance with a preferred embodiment of the present invention at least some of the disparate computers are operated by different computer operating systems. In accordance with a preferred embodiment of the present invention the network objects include inter-related subject matter.
Preferably, the network objects are owned by a common owner.
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Reference is now made to
The term “network object” for the purposes of this application is defined to include user generated enterprise computer network resources on any commercially available computer operating system. Examples of network objects include structured and unstructured computer data resources such as files and folders, mailboxes and mailing lists, disparate users, user groups and collections of user groups, and physical resources controlled by an enterprise computer network such as doors, parking lots and elevators.
As shown in
As also shown in
Reference is now made to
As shown in
The system then creates a third list of groups (210) and copies all groups of the first and second lists to the third list (212). Similarly, the system copies the authorizers of the first and second lists (214) and the rules of the first and second lists (216) to the third list. For the purposes of this application, “authorizers” are defined as users who have been granted limited management rights to a list, and “rules” are defined as a set of conditions under which users may be added or removed from a list.
Thereafter, the system assigns ownership of the third list to the owners of the first and second lists (218), and deletes the first and second lists (220).
Reference is now made to
As shown in
The project management system residing on server 300 preferably comprises a projects repository 320 which contains a plurality of project-wise lists of links to network objects. In the example of
It is a particular feature of this embodiment of the present invention that although actual folders 332 referenced by links 330 in each of project-wise lists 322, 324 and 326 may each reside in any of hierarchical folder structures 308 hosted on disparate file servers 306, each of project-wise lists 322, 324 and 326 may be employed to make changes in access permissions to the folders referenced by links 330 thereof without the need to individually access individual ones of actual folders 332.
In the example of
Reference is now made to
As shown in
Reference is now made to
As shown in
Turning now to
As shown in
The project management system residing on server 500 preferably comprises a projects repository 520 which contains a plurality of project-wise lists of links to network objects. In the example of
As further shown in
It is a particular feature of this embodiment of the present invention that although actual folders 540, 542 and 544 referenced by new list 538 may each reside in any of hierarchical folder structures 508 hosted on diverse computer platforms of disparate file servers 506, new list 538 may be employed to make changes in access permissions to the folders referenced thereby without the need to individually access individual ones of actual folders 540, 542 and 544.
Reference is now made to
As shown in
The project management system residing on server 600 preferably comprises a projects repository 620 which contains a plurality of project-wise lists of links to network objects. In the example of
It is a particular feature of this embodiment of the present invention that although actual folders 632 and mailboxes and mailing lists 610 referenced in each of lists 622, 624 and 626 may each reside in any of hierarchical folder structures 608 hosted on disparate file servers 606 and on disparate email servers 607 respectively, each of lists 622, 624 and 626 may be employed to make changes in access permissions to actual folders 632 and mailboxes and mailing lists 610 referenced by links thereof without the need to individually access individual ones of actual folders 632 and mailboxes and mailing lists 610.
In the example of
Turning now to
Reference is now made to
As shown in
Reference is now made to
As shown in
The project management system residing on server 800 preferably comprises a projects repository 820 which contains a plurality of project-wise lists of links to network objects. In the example of
It is a particular feature of this embodiment of the present invention that although actual folders 832 and doorway access permissions records 810 referenced in each of lists 822, 824 and 826 may each reside in any of hierarchical folder structures 808 hosted on disparate file servers 806 and on facility security server 807 respectively, each of lists 822, 824 and 826 may be employed to make changes in access permissions to actual folders 832 and in doorway access permissions records 810 referenced by links thereof without the need to individually access individual ones of actual folders 832 and doorway access permissions records 810.
In the example of
Turning now to
Reference is now made to
As shown in
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the present invention includes both combinations and subcombinations of the various features described hereinabove as well as modifications thereof which would occur to persons skilled in the art upon reading the foregoing description and which are not in the prior art.
Number | Name | Date | Kind |
---|---|---|---|
5465387 | Mukherjee | Nov 1995 | A |
5761669 | Montague | Jun 1998 | A |
5889952 | Hunnicutt et al. | Mar 1999 | A |
5899991 | Karch | May 1999 | A |
6308173 | Glasser et al. | Oct 2001 | B1 |
6338082 | Schneider | Jan 2002 | B1 |
6393468 | McGee | May 2002 | B1 |
6772350 | Belani et al. | Aug 2004 | B1 |
6928439 | Satoh | Aug 2005 | B2 |
7007032 | Chen et al. | Feb 2006 | B1 |
7017183 | Frey et al. | Mar 2006 | B1 |
7031984 | Kawamura et al. | Apr 2006 | B2 |
7068592 | Duvaut et al. | Jun 2006 | B1 |
7305562 | Bianco et al. | Dec 2007 | B1 |
7403925 | Schlesinger et al. | Jul 2008 | B2 |
7421740 | Fey et al. | Sep 2008 | B2 |
7555482 | Korkus | Jun 2009 | B2 |
7606801 | Faitelson et al. | Oct 2009 | B2 |
7716240 | Lim | May 2010 | B2 |
7743420 | Shulman et al. | Jun 2010 | B2 |
8447829 | Geller et al. | May 2013 | B1 |
8533787 | Faitelson et al. | Sep 2013 | B2 |
8805884 | Faitelson et al. | Aug 2014 | B2 |
8909673 | Faitelson et al. | Dec 2014 | B2 |
20020002557 | Straube et al. | Jan 2002 | A1 |
20020026592 | Gavrila | Feb 2002 | A1 |
20030051026 | Carter et al. | Mar 2003 | A1 |
20030188198 | Holdsworth et al. | Oct 2003 | A1 |
20040030915 | Sameshima et al. | Feb 2004 | A1 |
20040186809 | Schlesinger et al. | Sep 2004 | A1 |
20040249847 | Wang et al. | Dec 2004 | A1 |
20040254919 | Giuseppini | Dec 2004 | A1 |
20050044396 | Vogel et al. | Feb 2005 | A1 |
20050044399 | Dorey | Feb 2005 | A1 |
20050065823 | Ramraj et al. | Mar 2005 | A1 |
20050086529 | Buchsbaum | Apr 2005 | A1 |
20050108206 | Lam et al. | May 2005 | A1 |
20050120054 | Shulman et al. | Jun 2005 | A1 |
20050203881 | Sakamoto et al. | Sep 2005 | A1 |
20050246762 | Girouard et al. | Nov 2005 | A1 |
20050278334 | Fey et al. | Dec 2005 | A1 |
20050278785 | Lieberman | Dec 2005 | A1 |
20060037062 | Araujo | Feb 2006 | A1 |
20060064313 | Steinbarth et al. | Mar 2006 | A1 |
20060090208 | Smith | Apr 2006 | A1 |
20060184459 | Parida | Aug 2006 | A1 |
20060184530 | Song et al. | Aug 2006 | A1 |
20060271523 | Brookler et al. | Nov 2006 | A1 |
20060277184 | Faitelson et al. | Dec 2006 | A1 |
20060294578 | Burke | Dec 2006 | A1 |
20070033340 | Tulskie et al. | Feb 2007 | A1 |
20070073698 | Kanayama et al. | Mar 2007 | A1 |
20070094265 | Korkus | Apr 2007 | A1 |
20070101387 | Hua et al. | May 2007 | A1 |
20070112743 | Giampaolo et al. | May 2007 | A1 |
20070156659 | Lim | Jul 2007 | A1 |
20070156693 | Soin et al. | Jul 2007 | A1 |
20070198608 | Prahlad et al. | Aug 2007 | A1 |
20070203872 | Flinn et al. | Aug 2007 | A1 |
20070214497 | Montgomery et al. | Sep 2007 | A1 |
20070244899 | Faitelson et al. | Oct 2007 | A1 |
20070261121 | Jacobson | Nov 2007 | A1 |
20070266006 | Buss | Nov 2007 | A1 |
20070276823 | Borden et al. | Nov 2007 | A1 |
20070282855 | Chen et al. | Dec 2007 | A1 |
20080031447 | Geshwind et al. | Feb 2008 | A1 |
20080034402 | Botz et al. | Feb 2008 | A1 |
20080162707 | Beck et al. | Jul 2008 | A1 |
20080172720 | Botz et al. | Jul 2008 | A1 |
20080270462 | Thomsen | Oct 2008 | A1 |
20080271157 | Faitelson et al. | Oct 2008 | A1 |
20090100058 | Faitelson et al. | Apr 2009 | A1 |
20090119298 | Faitelson et al. | May 2009 | A1 |
20090150981 | Amies et al. | Jun 2009 | A1 |
20090198892 | Alvarez et al. | Aug 2009 | A1 |
20090249446 | Jenkins et al. | Oct 2009 | A1 |
20090265780 | Korkus et al. | Oct 2009 | A1 |
20090320088 | Gill et al. | Dec 2009 | A1 |
20100037324 | Grant et al. | Feb 2010 | A1 |
20100070881 | Hanson et al. | Mar 2010 | A1 |
20100262625 | Pittenger | Oct 2010 | A1 |
20110060916 | Faitelson et al. | Mar 2011 | A1 |
20110061093 | Korkus et al. | Mar 2011 | A1 |
20110061111 | Faitelson et al. | Mar 2011 | A1 |
20110184989 | Faitelson et al. | Jul 2011 | A1 |
20110296490 | Faitelson et al. | Dec 2011 | A1 |
20120054283 | Korkus et al. | Mar 2012 | A1 |
20120078965 | Laitkorpi | Mar 2012 | A1 |
20120271853 | Faitelson et al. | Oct 2012 | A1 |
20120271855 | Faitelson et al. | Oct 2012 | A1 |
20120291100 | Faitelson et al. | Nov 2012 | A1 |
Number | Date | Country |
---|---|---|
1588889 | Mar 2005 | CN |
101316273 | Dec 2008 | CN |
2005-267237 | Sep 2005 | JP |
2010-287171 | Dec 2010 | JP |
2011030324 | Mar 2011 | WO |
2011148376 | Dec 2011 | WO |
2011148377 | Dec 2011 | WO |
Entry |
---|
DatAdvantage User Guide by Varonis, Version 1.0, Aug. 30, 2005, 71 pages. |
DatAdvantage User Guide by Varonis, Version 2.0, Aug. 24, 2006, 118 pages. |
DatAdvantage User Guide by Varonis, Version 2.5, Nov. 27, 2006, 124 pages. |
DatAdvantage User Guide by Varonis, Version 2.6, Dec. 15, 2006, 127 pages. |
DatAdvantage User Guide by Varonis, Version 2.7, Feb. 6, 2007, 131 pages. |
DatAdvantage User Guide by Varonis, Version 3.0, Jun. 20, 2007, 153 pages. |
List of database tables in DatAdvantage 2.7, Feb. 6, 2007. |
List of database tables in DatAdvantage 3.0, Jun. 20, 2007. |
List of all the Versions of the DatAdvantage Product and User Guide by Varonis, Jun. 20, 2007. |
Sahadeb DE, et al; “Secure Access Control in a Multi-user Geodatabase”, available on the Internet at the URL http://www10.giscafe.com.2005. |
FINDUTILS-GNU Project; Free Software Foundation (FSF), 3 pages, Nov. 2006. |
Genunix; “Writing Filesystems—VFS and Vnode interfaces”, From Genunix; 5 pages, Oct. 2007. |
S.R. Kleiman; “Vnodes: An Architecture for Multiple File System Types in Sun UNIX”, USENIX Association: Summer Conference Proceedings, Atlanta 1986. |
Sara C. Madeira, et al; “Biclustering Algorithms for Biological Data Analysis: A Survey”, IEEE Transactions on Computational Biology and Bioinformatics, vol. 1, No. 1, Jan.-Mar. 2004, 22 pages. |
Sara C. Madeira: “Clustering, Fuzzy Clustering and Biclustering: An Overview”, pp. 31 to 53, Jun. 27, 2003. |
Alex Woodie; “Varonis Prevents Unauthorized Access to Unstructured Data”, Four Hundred Stuff, vol. 7, No. 29, Jul. 31, 2007, 4 pages. |
Varonis: “Accelerating Audits with Automation: Understanding Who's Accessing Your Unstructured Data”, By Varonis, Oct. 8, 2007, 7 pages. |
Varonis: “The Business Case for Data Governance”, By Varonis, dated Mar. 27, 2007; 8 pages. |
International Preliminary Report on Patentability issued Jul. 30, 2013; PCT/IL2011/000902. |
International Preliminary Report on Patentability issued Jul. 30, 2013; PCT/IL2011/000903. |
International Search Report mailed May 23, 2011; PCT/IL2011/000065. |
International Search Report and Written Opinion mailed May 20, 2010; PCT/IL10/00069. |
International Search Report and Written Opinion dated Jun. 14, 2011; PCT/IL11/00066. |
International Search Report and Written Opinion dated Jun. 13, 2011; PCT/IL11/00076. |
International Search Report and Written Opinion dated May 24, 2011; PCT/IL11/00077. |
International Search Report and Written Opinion dated Apr. 13, 2012; PCT/IL11/00902. |
International Search Report and Written Opinion dated Nov. 15, 2011 PCT/IL11/00408. |
International Search Report and Written Opinion dated Aug. 31, 2012 PCT/IL2012/000163. |
U.S. Appl. No. 60/688,486, filed Jun. 7, 2005. |
U.S. Appl. No. 12/673,691, filed Feb. 16, 2010. |
U.S. Appl. No. 61/477,662, filed Apr. 21, 2011. |
USPTO NFOA mailed Feb. 12, 2008 in connection with U.S. Appl. No. 11/258,256. |
USPTO FOA mailed Aug. 1, 2008 in connection with U.S. Appl. No. 11/258,256. |
USPTO NFOA mailed Oct. 31, 2008 in connection with U.S. Appl. No. 11/635,736. |
USPTO NFOA mailed Dec. 14, 2010 in connection with U.S. Appl. No. 11/786,522. |
USPTO NFOA mailed Jul. 9, 2010 in connection with U.S. Appl. No. 11/789,884. |
USPTO NFOA mailed Dec. 14, 2010 in connection with U.S. Appl. No. 11/789,884. |
USPTO NOA mailed Apr. 12, 2012 in connection with U.S. Appl. No. 11/789,884. |
USPTO NFOA dated Sep. 16, 2010 in connection with U.S. Appl. No. 11/871,028. |
USPTO FOA dated Apr. 28, 2011 in connection with U.S. Appl. No. 11/871,028. |
USPTO NFOA dated Sep. 14, 2012 in connection with U.S. Appl. No. 12/861,967. |
USPTO NFOA dated Jul. 11, 2012 in connection with U.S. Appl. No. 13/014,762. |
USPTO RR dated Nov. 21, 2012 in connection with U.S. Appl. No. 13/106,023. |
USPTO NFOA dated Jan. 15, 2013 in connection with U.S. Appl. No. 13/159,903. |
USPTO NFOA dated Mar. 13, 2014 in connection with U.S. Appl. No. 13/159,903. |
USPTO NFOA dated Sep. 19, 2012 in connection with U.S. Appl. No. 13/303,826. |
USPTO FOA dated Mar. 25, 2013 in connection with U.S. Appl. No. 13/303,826. |
USPTO NFOA dated Jun. 4, 2014 in connection with U.S. Appl. No. 13/303,826. |
USPTO NOA mailed Jul. 11, 2014 in connection with U.S. Appl. No. 13/303,826. |
USPTO FOA dated Sep. 6, 2013 in connection with U.S. Appl. No. 13/378,115. |
USPTO NFOA dated Jul. 8, 2014 in connection with U.S. Appl. No. 13/378,115. |
Ebell: “Access Control Lists—alfrescowiki”, Jun. 5, 2008 (Jun. 5, 2008), XP055268315, Retrieved from the Internet URL:https://wiki.alfresco.com/index.php7ti tle=Access—Control—Li sts&oldi d=19082. |
Dennis Lu et al. “Jesse Dyer”, Jul. 15, 2004 (Jul. 15, 2004), XP055268358, Retrieved from the Internet: URL:https://web.archive.org/web/20040715000000*/http://www.owlnet.rice.edu/˜welsh/comp527/comp527—Final—Report.doc. |
Extended European Search Report dated May 3, 2016, Appln. No. 12774249.2-1870/2700028 PCT/IL2012000163. |
First Chinese Office Action dated Jun. 29, 2016; Appln. No. 2012800293603 (In English). |
Number | Date | Country | |
---|---|---|---|
20150026778 A1 | Jan 2015 | US |
Number | Date | Country | |
---|---|---|---|
61477662 | Apr 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13303826 | Nov 2011 | US |
Child | 14508390 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13014762 | Jan 2011 | US |
Child | 13303826 | US | |
Parent | 13106023 | May 2011 | US |
Child | 13014762 | US | |
Parent | 13159903 | Jun 2011 | US |
Child | 13106023 | US |