The present invention relates to systems, methods, and computer-readable media of a comprehensive security system, and more particularly to systems, methods, and computer-readable media that enables employees to securely setup and maintaining system security for all business systems.
Businesses rely on many systems to run their operations. For example, most businesses run an accounting system that maintains the financial records of the business. Timekeeping and billing systems enable businesses to track employee work hours and to justify invoices provided to their customers. Many businesses also rely on asset management systems, inventory systems, payroll systems, etc. Still further, some types of business need complicated project management, system maintenance and customer communication systems.
While all of these tools enable a complex business to operate smoothly, one problem associated with such a vast array of systems is authentication and access control. Often an employee will have to logon and logout of several systems to accomplish all of the tasks involved in their job responsibilities. However, the systems are often provided by different vendors and manufacturers. Thus, using the systems becomes cumbersome to manage as well as use.
Accordingly, it can be seen that businesses need a way to enable authorized employees to setup and maintain systems involved in a business in a secure manner.
Embodiments of the present invention address these issues by providing methods, computer-readable media, and systems for distributing the security for accessing the business systems across databases while simplifying security maintenance.
According to one embodiment of the present invention, a method for securing business systems accessed by a plurality of users over a plurality of locations is disclosed. The method includes providing a user interface on a display device for entering data for authenticating and authorizing a user associated with the data, providing security across a plurality of business modules distributed over a plurality of locations using a distributed security platform by processing the data entered by the user to determine rights related to the user associated with the entered data, upon determining rights related to the user associated with the entered data, providing the user access and control to the business modules according to the determined rights, controlling communication between the plurality of business modules distributed over the plurality of locations by the distributed security platform using an Internet Protocol and distributed data management (DDM) files on databases distributed over the plurality of locations and ensuring data integrity by the distributed security platform despite concurrent user accesses and faults.
In another embodiment, a computer-readable medium includes computer-executable instructions stored thereon for implementing a system for securing business systems accessed by a plurality of users over a plurality of locations. The computer-executable instructions, when executed by a computer, cause the computer to provide a user interface on a display device for entering data for authenticating and authorizing a user associated with the data, provide security across a plurality of business modules distributed over a plurality of locations using a distributed security platform, the distributed security platform processing the data entered by the user to determine rights related to the user associated with the entered data, upon determining rights related to the user associated with the entered data, provide the user access and control to the business modules according to the determined rights, control communication between the plurality of business modules distributed over the plurality of locations by the distributed security platform using an Internet Protocol and distributed data management (DDM) files on databases distributed over the plurality of locations and ensure data integrity by the distributed security platform despite concurrent user accesses and faults.
In another embodiment, a distributed security system includes memory configured to store information for implementing the distributed security system and a processor, coupled to the memory, the processor providing a user interface on a display device for entering data for authenticating and authorizing a user associated with the data, providing security across a plurality of business modules distributed over a plurality of locations using a distributed security platform, the distributed security platform processing the data entered by the user to determine rights related to the user associated with the entered data, upon determining rights related to the user associated with the entered data, providing the user access and control to the business modules according to the determined rights, controlling communication between the plurality of business modules distributed over the plurality of locations by the distributed security platform using an Internet Protocol and distributed data management (DDM) files on databases distributed over the plurality of locations and ensuring data integrity by the distributed security platform despite concurrent user accesses and faults.
These and other features and advantages, which characterize the present invention, will be apparent from a reading of the following detailed description and a review of the associated drawings. It is to be understood that both foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
Embodiments of the present invention are directed to a security management system that provides comprehensive security to business systems by distributing the security for accessing the business systems across databases and that simplifies security maintenance. The security management system is used to control all aspects of a business. The security management system handles the generation of bills, pings converter boxes, schedules pay per view, etc. Employees may log in to the security management system and the management system gives them their permissions to go into the billing module. Dispatchers that need to do execute their tasks also need permissions, which are also granted through the security management system.
The locations 210 listed below each machine on the diagram are the locations that are running on that machine. The security system 200 provides an automated method that allows security to the system to be distributed across databases and simplifies security maintenance. The security management system may be used to control all aspects of business thereby providing increased security across all functions of the business. For example, the security system 200 handles the generation of bills, pings converter boxes, schedules pay per view, etc.
Accordingly, the security system 200 provides the following features and enhancements:
The memory 230 is configured to store information for implementing the distributed security system 215. The processor 220 provides a user interface on a display device for entering data for authenticating and authorizing a user associated with the data, provides security across a plurality of business modules distributed over a plurality of locations using a distributed security platform 215. The distributed security platform 215 processes the data entered by the user to determine rights related to the user associated with the entered data. Upon determining rights related to the user associated with the entered data, the processor 220 provides the user access and control to the business modules according to the determined rights, controls communication between the plurality of business modules distributed over the plurality of locations by the distributed security platform 215 using an Internet Protocol and distributed data management (DDM) files on databases distributed over the plurality of locations and ensures data integrity by the distributed security platform 215 despite concurrent user accesses and faults.
The processor 220 ensures data integrity by periodically synchronizing the DDM files to logically interrelate the plurality of databases to maintain a single version of the data in each of the plurality of databases. The processor 220 periodically synchronizes the DDM files to logically interrelate the plurality of databases to maintain a single version of the data in each of the plurality of databases. The processor 220 implements an active directory process to download active directory names from each of the plurality of locations to select when new users needing access are setup. Users are assigned to a new location without waiting for the active directory process to run when users have moved to the new location on the active directory user file. Active directory names are converted using a global process across the plurality of databases in the plurality of locations. A password reset option is presented to the user to allow security personnel to reset expired or disabled profiles for users. A security interface enables a user to create and manage profiles.
The processor 220 causes a user interface to be displayed allowing a user to create a multiple location user profile to allow the user to access multiple locations. A user may add comments to a profile. A user may view profiles assigned to a particular group. A user may perform at least one of setting up user functions, selecting locations, interfacing with a workforce management module, performing maintenance operations, selecting menu options, and selecting filters for listing job control numbers. A user may define authorization rights for single location users and multiple location users at each site. Data associated with at least one parameter chosen from the group consisting of locations, profiles, users, group profiles, menus, menu options, functions, and authorization options, may be manipulated. A user may add or delete parameters. A user may add or delete a single parameter or a plurality of parameters.
Table 1 describes the functions of the CSS Main Menu screen.
Table 2 describes the various methods for the user to interact with the AS/400 screens.
Table 3 shows how the four types of users are displayed on the User Function screen.
Table 5 describes the fields and function keys of the User Set-up screen.
Table 6 describes the options and function keys of the User Function screen.
Table 7 describes the fields of the Select Filters window.
Table 8 describes the ICOMS Security screen fields and function keys.
Table 9 shows the three ways to select sites and the screen's function keys along with a description of each field.
Table 10 describes the function keys for the ICOMS Menu Option Selection screen.
Table 11 defines the ICOMS Function Selection screen's functions.
Table 12 lists and defines the functions for the ICOMS Adj Code Selection and ICOMS CM Function Selection screens.
Table 13 shows the functions and function keys for the ICOMS Apply/Delete-MLU screen along with a description.
Table 15 lists and describes the Job Control Maintenance screen options and function keys.
Communication between the plurality of business modules distributed over the plurality of locations by the distributed security platform using an Internet Protocol and distributed data management (DDM) files on databases distributed over the plurality of locations are controlled 7440. Data integrity is ensured by the distributed security platform despite concurrent user accesses and faults 7450.
Referring back to
Embodiments implemented on computer-readable media 290 may refer to a mass storage device, such as a hard disk or CD-ROM drive. However, it should be appreciated by those skilled in the art that computer-readable media can be any available media that can be accessed or utilized by a processing device, e.g., server or communications network provider infrastructure.
By way of example, and not limitation, computer-readable media 290 may include, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, digital versatile disks (“DVD”), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other tangible medium which can be used to store the desired information and which can be accessed by a processing device.
As mentioned briefly above, a number of program modules and data files may be stored and arranged for controlling the operation of processing devices. Thus, one or more processing devices 220 may be configured to execute instructions that perform the operations of embodiments of the present invention.
It should also be appreciated that various embodiments of the present invention can be implemented (1) as a sequence of computer implemented acts or program modules running on a processing device and/or (2) as interconnected machine logic circuits or circuit modules within the processing devices. The implementation is a matter of choice dependent on the performance requirements. Accordingly, logical operations including related algorithms can be referred to variously as operations, structural devices, acts or modules. It will be recognized by one skilled in the art that these operations, structural devices, acts and modules may be implemented in software, firmware, special purpose digital logic, and any combination thereof without deviating from the spirit and scope of the present invention as recited within the claims set forth herein.
Memory 230 thus may store the computer-executable instructions that, when executed by processor 220, cause the processor 220 to implement a system as illustrated above in
The above specification, examples and data provide a complete description of the manufacture and use of the composition of the invention. Since many embodiments of the invention can be made without departing from the spirit and scope of the invention, the invention resides in the claims hereinafter appended.
This application is a continuation of application Ser. No. 12/845,086, filed Jul. 28, 2010, now U.S. Pat. No. 11,308,490, which application is incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
5696898 | Baker et al. | Dec 1997 | A |
5781908 | Williams et al. | Jul 1998 | A |
7653668 | Shelat et al. | Jan 2010 | B1 |
7739239 | Cormie et al. | Jun 2010 | B1 |
7765229 | Samji et al. | Jul 2010 | B2 |
7860827 | Ayyad | Dec 2010 | B1 |
8069117 | Gay et al. | Nov 2011 | B1 |
20030018719 | Ruths et al. | Jan 2003 | A1 |
20040078569 | Hotti | Apr 2004 | A1 |
20040199540 | Nojima | Oct 2004 | A1 |
20050021713 | Dugan et al. | Jan 2005 | A1 |
20050216503 | Charlot | Sep 2005 | A1 |
20060020581 | Dettinger et al. | Jan 2006 | A1 |
20060080397 | Chene et al. | Apr 2006 | A1 |
20060190243 | Barkai et al. | Aug 2006 | A1 |
20060294578 | Burke et al. | Dec 2006 | A1 |
20070100834 | Andry et al. | May 2007 | A1 |
20090178109 | Nice et al. | Jul 2009 | A1 |
20100153346 | Thode | Jun 2010 | A1 |
20100262625 | Pittenger | Oct 2010 | A1 |
20110277027 | Hayton et al. | Nov 2011 | A1 |
Entry |
---|
A. Furmanyuk, M. Karpinskyy and B. Borowik, “Modern Approaches to the Database Protection,” 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, Dortmund, Germany, 2007, pp. 590-593, doi: 10.1109/IDAACS.2007.4488489. (Year: 2007). |
IBM, “Access Controller in the Service-Oriented Architecture”, 2009, retrieved from https://ip.com/IPCOM/000180678 (Year: 2009). |
C. Lutteroth and G. Weber, “Database synchronization as a service,” 2009 13th Enterprise Distributed Object Computing Conference Workshops, Auckland, New Zealand, 2009, pp. 84-91, doi: 10.1109/EDOCW.2009.5332009. (Year: 2009). |
Saeed K. Rahimi and Frank S. Haug, “Distributed Database Management Systems: A Practical Approach,”, 2010, First Published Jul. 16, 2010 https://books.google.com/books?id=kRZwykrabCQC&printsec=frontcover&dq=editions:ISBN0470602368 (Year: 2010). |
D. Cohen, “Database systems: Implementation of a distributed database management system to support logical subnetworks,” in The Bell System Technical Journal, 1982, vol. 61, No. 9, pp. 2459-2474, Nov. 1982, doi: 10.1002/j.1538-7305. 1982.tb03435.x. (Year: 1982). |
R. A. Demers, J. D. Fisher, S. S. Gaitonde and R. R. Sanders, “Inside IBM's Distributed Data Management architecture,” in IBM Systems Journal, vol. 31, No. 3, pp. 459-487, 1992, doi: 10.1147/sj.313.0459. (Year: 1992). |
J. Saleh Ashir, ““Technical perspective on the heterogeneous databases interoperability,”” Proceedings 11th International Workshop on Database and Expert Systems Applications, London, UK, 2000, pp. 739-752, doi: 10.1109/DEXA.2000.875108. (Year: 2000). |
I. Akturk, X. Wang and T. Kosar, “Toward a Reliable Distributed Data Management System,” 2010 Ninth International Symposium on Parallel and Distributed Computing, Istanbul, Turkey, 2010, pp. 109-116, doi: 10.1109/ISPDC.2010.15. (Year: 2010). |
Kun Sun et al., “Securing MANET databases using metadata and context information,” MILCOM 2008—2008 IEEE Military Communications Conference, 2008, pp. 1-6, doi: 10.1109/MILCOM.2008.4753194. (Year: 2008). |
Z. Yangqing, Y. Hui, L. Hua and Z. Lianming, “Design of a New Web Database Security Model,” 2009 Second International Symposium on Electronic Commerce and Security, 2009, pp. 292-295, doi: 10.1109/ISECS.2009.180. (Year: 2009). |
Z. S. Zubi, “On distributed database security aspects,” 2009 International Conference on Multimedia Computing and Systems, 2009, pp. 231-235, doi: 10.1109/MMCS.2009.5256696. (Year: 2009). |
Saeed K. Rahimi, Frank S. Haug, Distributed Database Management Systems: A Practical Approach. First Published Jul. 19, 2010 ( Year: 2010). |
Number | Date | Country | |
---|---|---|---|
20220327534 A1 | Oct 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12845086 | Jul 2010 | US |
Child | 17722761 | US |