The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Aug. 21, 2007
Filed:
Feb. 12, 2002
Alain Rossmann, Palo Alto, CA (US);
Patrick Zuili, Palo Alto, CA (US);
Michael Michio Ouya, Portola Valley, CA (US);
Serge Humpich, Tournan-en-Brie, FR;
Chang-ping Lee, Palo Alto, CA (US);
Klimenty Vainstein, Morgan Hill, CA (US);
Hal Hilderbrand, Moss Beach, CA (US);
Denis Jacques Paul Garcia, Palo Alto, CA (US);
Senthilvasan Supramaniam, San Calros, CA (US);
Weiqing Huang, Sunnyvale, CA (US);
Nicholas Michael Ryan, Sunnyvale, CA (US);
Alain Rossmann, Palo Alto, CA (US);
Patrick Zuili, Palo Alto, CA (US);
Michael Michio Ouya, Portola Valley, CA (US);
Serge Humpich, Tournan-en-Brie, FR;
Chang-Ping Lee, Palo Alto, CA (US);
Klimenty Vainstein, Morgan Hill, CA (US);
Hal Hilderbrand, Moss Beach, CA (US);
Denis Jacques Paul Garcia, Palo Alto, CA (US);
Senthilvasan Supramaniam, San Calros, CA (US);
Weiqing Huang, Sunnyvale, CA (US);
Nicholas Michael Ryan, Sunnyvale, CA (US);
Guardian Data Storage, LLC, Wilmington, DE (US);
Abstract
Techniques for providing pervasive security to digital assets are disclosed. According to one aspect of the techniques, a server is configured to provide access control (AC) management for a user (e.g., a single user, a group of users, software agents or devices) with a need to access secured data. Within the server module, various access rules for the secured data and/or access privileges for the user can be created, updated and managed so that the user with the proper access privileges can access the secured documents if granted by the corresponding access rules in the secured data.