N/A
N/A
This invention relates to surveillance systems and, in particular, to a system and method of controlling access to system resources in a surveillance system. As used herein the term surveillance system includes building management, access control, and security systems.
As surveillance systems have become more complex with the possibility that multiple personnel may be operating the surveillance system at the same time and that these personnel may be in different jobs or roles, there has arisen a need for simplifying the task of creating the appropriate roles and assigning the appropriate set of permissions to access system resources that are necessary to perform the job or role. In addition, it is necessary to have necessary controls in place so that the user assigned to the particular job or role does not have access to system resources that are not required by that job or role. Since there has been no mechanism available, the administrator of the system has been burdened with the task of meeting the demands of numerous departments to create roles and assign only the necessary permissions to the role. With today's rapid changes in organizations and job responsibilities, there is a need for a more efficient and flexible mechanism for creating roles and assigning access to the required system resources.
In accordance with the present invention there is provided a method of assigning access to system resources comprising the steps of: providing a set of system permissions to access the system resources; providing a role creation permission to allow a role having a role set of permissions, which is a subset of the set of system permissions, to create a role having a set of permissions from the role set of permissions; creating a first role having a first set of permissions including a permission from the system permissions and a role creation permission; assigning a user to the first role; and allowing the user to create a second role having a second set of permissions which include only permissions from the first set of permissions.
There is also provided in accordance with the present invention a method of assigning access to system resources comprising the steps of: providing a set of system permissions to access the system resources; providing a role creation permission to allow a role having a role set of permissions, which is a subset of the set of system permissions, to create a role having a set of permissions from the role set of permissions; creating a first role having a first set of permissions including a permission from the system permissions and the role creation permission; assigning a first user to the first role; creating a second role having a second set of permissions including a permission from the system permissions and the role creation permission; assigning a second user to the second role; and allowing the first and second users to create a third role having a third set of permissions which include only permissions from the first and second sets of permissions. The subject method may further comprise the steps of providing a co-parent permission, determining if a role has the co-parenting permission, and not allowing a role to be a co-parent if the role does not have the co-parenting permission.
In addition, the present invention provides an apparatus for assigning access to system resources in a networked system comprising: a plurality of resources connected to a network; memory for storing a set of system permissions to access the video surveillance resources, a role creation permission to allow a role having a role set of permissions from the set of system permissions to create a role having a set of permissions from the role set of permissions, and a first role having a first set of permissions including a permission from the set of system permissions and the role creation permission; and a processor in communication with the memory for allowing a request to assign a first user to the first role and for allowing the first user to create a second role having a second set of permissions provided that the second set of permissions includes only permissions from the first set of permissions.
Still further, the present invention provides an apparatus for assigning access to system resources in a networked system comprising: a plurality of resources connected to a network; memory for storing a set of system permissions to access the video surveillance resources, a role creation permission to allow a role having a role set of permissions from the set of system permissions to create a role having a set of permissions from the role set of permissions, a first role having a first set of permissions including a permission from the set of system permissions, and a second role having a second set of permissions including a permission from the set of system permissions; and a processor in communication with the memory for allowing a request to assign a first user to the first role and a second user to the second role and for allowing the first user and the second user to create a third role having a third set of permissions provided that the third set of permissions includes only permissions from the first and second sets of permissions. In the subject apparatus, the memory may also store a co-parenting permission, and the processor determines if a role has the co-parenting permission and does not allow a role to be a co-parent if the role does not have the co-parenting permission.
The apparatus and method of the present invention provide a flexible and efficient way to manage the creation of roles and the assignment of permissions to utilize system assets even in a large distributed system. The subject invention also ensures that improper roles are not created.
Other advantages and applications of the present invention will be made apparent by the following detailed description of the preferred embodiment of the invention.
Referring to
The system policies are based on roles and permission sets associated with those roles. A user accesses video surveillance system 10 through a user login by supplying a valid login name and associated password to the system by using input device 14 or 16. Once a user has logged into the system it is the role or roles to which the user has been assigned that determine which system resources the user can access. The role created by an administrator or other as described herein is stored in memory 32. Each role has its respective set of permissions to access system resources. The role's set of permissions provide the person in that role access to the necessary system resources to perform the job associated with the role, such as guard for building #1. Roles provide flexibility in an organization where people may change jobs or leave. If a person switches to a different job, he only needs to be assigned his new role and removed from the old role. If a person leaves the business, he is simply removed as a member of the role or roles he had been assigned. The roles do not change, only the set of people assigned to the roles change. In addition, roles can be easily modified by adding new permissions to system resources or removing permissions. Any user assigned to the role will then have the new permissions to access system resources.
For the purpose of role and user administration, all roles have some relationship with other roles. The role relationships supported by the system can be thought of as parent-child relationships. When a user role related permission is assigned to a role, that permission cannot be used unless the role is made a parent of another role. Once a parent-child relationship exists between two roles, a user assigned to the parent role may apply any role related service permissions of the role towards its role child.
Each role related service is limited to only the child roles of those roles granted permission to the service. For example, a configuration where two parent roles having exclusive sets of children have been defined as Role A, which has the permission to rename its child roles, and Role B, which does not have the permission to rename its child roles. If a user is assigned to both roles, he could only rename the child roles of Role A and not Role B. Even though the user was granted permission to a service allowing the renaming of child roles, application of that service can only be directed to children of the role through which the permission was granted, i.e., Role A.
A role can have any number of child roles, and a role can have any number of parent roles. However, not all roles can be made parents of other roles. The system policies stored in memory 30 prevent a role from becoming the parent of another role when a chain of one or more parent-child relationships loops back to a parent role in the chain. This prevents parent relationships from being established in cases where a role might be made a parent of itself, or where a role might be made a parent to a child role which in turn is made a parent to itself and so on. This restriction prevents the accidental granting of permissions through grandchild relationships and prevents the system from becoming too complicated to administer and comprehend.
All roles must have at least one parent role, except the administrator role. When a role is created, a parent must be specified for the creation process so that all roles have at least one parent role with permission to apply role related operations.
When a parent role is given a new permission, the parent role can apply the new permission to the role's children and descendents if desired. For example, with reference to
Role 38 has a permission set that consists of permissions to access system resources, such as camera 18 in
With reference to
When the system is first installed, only the administrator role is defined, and the user in the administrator role is the user that creates the initial roles and users for the system. Any new role created by the administrator can be given as many permissions as the administrator has, which is the entire permission set for the system resources as discussed in relation to
It is to be understood that variations and modifications of the present invention can be made without departing from the scope of the invention. It is also to be understood that the scope of the invention is not to be interpreted as limited to the specific embodiments disclosed herein, but only in accordance with the appended claims when read in light of the foregoing disclosure.