Dynamic, temporary data access token
First Claim
1. A method implemented in a software application of a computer, the software application comprising a plurality of application components, the method comprising:
- sending, using a hardware processor of the computer, a configuration policy of a temporary data access token to a registered user, wherein the configuration policy allows access to a first portion of data without allowing access to a second portion of the data, and wherein at least one of the first portion of the data and the second portion of the data is comprised of one or more of the plurality of application components; and
receiving, using the hardware processor of the computer, an updated configuration policy from the registered user to allow access to the second portion of the data without allowing access to the first portion of the data, andwherein a non-registered user utilizing the temporary data access token associated with the updated configuration policy is denied access to the first portion of the data and allowed access to the second portion of the data by a software other than the software application.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are techniques for generating a temporary data access token for a subset of data for a specific period of time for a non-registered user who did not register with a computer providing access to the subset of the data. In response to the non-registered user attempting to access the subset of data with the temporary data access token, it is determined whether the temporary data access token is valid for the subset of data based on the specified period of time. In response to the temporary data access token being valid, the subset of data is provided to the non-registered user. In response to the temporary data access token not being valid, access is denied to the subset of data by the non-registered user.
25 Citations
15 Claims
-
1. A method implemented in a software application of a computer, the software application comprising a plurality of application components, the method comprising:
-
sending, using a hardware processor of the computer, a configuration policy of a temporary data access token to a registered user, wherein the configuration policy allows access to a first portion of data without allowing access to a second portion of the data, and wherein at least one of the first portion of the data and the second portion of the data is comprised of one or more of the plurality of application components; and receiving, using the hardware processor of the computer, an updated configuration policy from the registered user to allow access to the second portion of the data without allowing access to the first portion of the data, and wherein a non-registered user utilizing the temporary data access token associated with the updated configuration policy is denied access to the first portion of the data and allowed access to the second portion of the data by a software other than the software application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer, comprising:
-
a hardware processor; and storage coupled to the hardware processor, wherein the storage stores a software application comprising a plurality of application components, and wherein the hardware processor is configured to execute the software application to perform operations, wherein the operations comprise; sending a configuration policy of a temporary data access token to a registered user, wherein the configuration policy allows access to a first portion of data without allowing access to a second portion of the data, and wherein at least one of the first portion of the data and the second portion of the data is comprised of one or more of the plurality of application components; and receiving an updated configuration policy from the registered user to allow access to the second portion of the data without allowing access to the first portion of the data, and wherein a non-registered user utilizing the temporary data access token associated with the updated configuration policy is denied access to the first portion of the data and allowed access to the second portion of the data by a software other than the software application. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product comprising a non-transitory computer readable storage medium including a computer readable software application, the computer readable software application comprising a plurality of application components, wherein the computer readable software application, when executed by a hardware processor on a computer causes the computer to perform:
-
sending a configuration policy of a temporary data access token to a registered user, wherein the configuration policy allows access to a first portion of data without allowing access to a second portion of the data, and wherein at least one of the first portion of the data and the second portion of the data is comprised of one or more of the plurality of application components; and receiving an updated configuration policy from the registered user to allow access to the second portion of the data without allowing access to the first portion of the data, and wherein a non-registered user utilizing the temporary data access token associated with the updated configuration policy is denied access to the first portion of the data and allowed access to the second portion of the data by a software other than the computer readable software application. - View Dependent Claims (12, 13, 14, 15)
-
Specification