Abstract:
PROBLEM TO BE SOLVED: To provide a web based security application to an access control for data sponsored by an organization and another resource. SOLUTION: The web-based security application to the access control for the data sponsored by the organization and another resource comprises the following five processes of: (1) accessing the information protected by the security; (2) enabling for the access control to access a user having an indirect relation and a direct relation with the organization; (3) assigning the security management from a central information technology source to a user for a security system; (4) supporting to combine the security management with a different environment; and (5) supporting a system administrator. The web based security application is employed by an independent type security system which controls an access to security protection information for a sponsored organization and a self-service function, which can be used for a "web" based and "IVR" based self-service function. COPYRIGHT: (C)2009,JPO&INPIT
Abstract:
A stand-alone security system controlling access to secured information and self-service functionality for a sponsor organization, usable for Web-based and IVR-based self-service functions, having five primary facets: (1) contro l of access to secured information (2) enabling access to users having indirec t and direct relationships with the sponsor organization (3) distribution of security administration from a central information technology resource to users of the security system, (4) support for integration into different environments, and (5) support for system integrators. Key components of acce ss control include (1) association of a userID with one specific person, (2) identification of keys to data in back-end systems and association of those keys with the system users, (3) definition of pieces (segments) of an organization so that permissions are granted based on the pieces, (4) definition of user roles based on the functionality to which he has been giv en permission, (5) a single sign-on for a user with multiple reasons to use the system, and (6) support for direct and indirect assignment of business functions.