The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Dec. 23, 2014
Filed:
Oct. 21, 2011
Luis B. Casco-arias Sanchez, Austin, TX (US);
Todd D. Jordan, Raleigh, NC (US);
David G. Kuehr-mclaren, Apex, NC (US);
Oriana J. Love, Richland, WA (US);
David W. Palmieri, Cary, NC (US);
Chrystian L. Plachco, Morrisville, NC (US);
Magesh Rajamani, Pune, IN;
Jeffrey T. Robke, Apex, NC (US);
Luis B. Casco-Arias Sanchez, Austin, TX (US);
Todd D. Jordan, Raleigh, NC (US);
David G. Kuehr-McLaren, Apex, NC (US);
Oriana J. Love, Richland, WA (US);
David W. Palmieri, Cary, NC (US);
Chrystian L. Plachco, Morrisville, NC (US);
Magesh Rajamani, Pune, IN;
Jeffrey T. Robke, Apex, NC (US);
International Business Machines Corporation, Armonk, NY (US);
Abstract
Mechanisms are provided for performing a role engineering project for applying security roles to access operations targeting resources. A plurality of data objects representing one or more user identities, permissions, and resources of an organization computing system are received. One or more filter criteria for filtering the plurality of data objects to generate a subset of data objects for consideration during the role engineering project are received. The one or more filter criteria specify a scope of the role engineering project. The one or more filter criteria are applied to generate the subset of data objects. Role engineering project operations are performed on the subset of data objects to generate one or more security roles. The one or more security roles are deployed to the organization computing system to control access operations targeting resources of the organization computing system.