×

Adaptive model for database security and processing

  • US 10,242,232 B1
  • Filed: 07/06/2018
  • Issued: 03/26/2019
  • Est. Priority Date: 10/24/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for adaptive access control of data objects, the method comprising:

  • receiving, by a security system, input data from a first client device to provide authorization to a given entity to access a data object of a plurality of data objects in a software system, the authorization to access the data object associated with a geographical domain;

    determining a current location of a second client device of the given entity based on a first set of sensor data received by the security system from the second client device;

    determining, using a model of the security system, that the current location is within the geographical domain, the model including a set of expressions for determining authorizations of entities to access data objects based on common parameters describing the entities;

    responsive to the determination that the current location is within the geographical domain;

    automatically updating an authorization database record of the security system to authorize the given entity to access the data object,transmitting an indication of the updated authorization database record to one or more systems associated with the given entity;

    determining an updated location of the second client device based on a second set of sensor data received by the security system from the second client device;

    determining, using the model, that the updated location is outside of the geographical domain;

    responsive to the determination that the updated location is outside of the geographical domain;

    automatically updating the authorization database record to remove authorization for the given entity to access the data object, andtransmitting another indication of the updated authorization database record to the one or more systems associated with the given entity;

    after updating the authorization database record to remove authorization for the given entity, determining a different location of the second client device based on a third set of sensor data received by the security system from the second client device; and

    responsive to determining that the different location is within the geographical domain, automatically updating the authorization database record to authorize the given entity to access the data object.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×