Secure data corridors for data feeds
First Claim
Patent Images
1. A computing device configured to provide a secure data corridor, the computing device comprising:
- a processor;
a network interface communicatively coupled to the processor and configured to enable communications with a mobile traffic network;
a storage device for content and programming;
a security application stored in the storage device, wherein execution of the security application by the processor configures the computing device to perform acts comprising;
receiving a request from a subject for at least one data element of a data feed;
identifying a use-case for the data feed;
assigning a security label to the use-case that includes a data sensitivity rating of the use-case;
comparing a clearance of the subject to the security label of the use-case;
upon determining that the clearance of the subject is at or above the data sensitivity rating of the use-case, allowing the subject access privilege to the data feed via the secure data corridor; and
assigning an additional data sensitivity rating to the secure data corridor that corresponds with or is substantially similar to a particular data sensitivity rating of the data feed that is transmitted through the secure data corridor.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method of providing a secure data corridor are provided. A request from a subject for at least one data element of a data feed is received. A use-case is identified for the data feed. A security label is assigned to the use-case. A clearance of the subject is compared to the security label of the use-case. Upon determining that a clearance of the subject is at or above the data sensitivity rating of the use-case, the subject is allowed access privilege to the data feed via the secure data corridor.
-
Citations
20 Claims
-
1. A computing device configured to provide a secure data corridor, the computing device comprising:
-
a processor; a network interface communicatively coupled to the processor and configured to enable communications with a mobile traffic network; a storage device for content and programming; a security application stored in the storage device, wherein execution of the security application by the processor configures the computing device to perform acts comprising; receiving a request from a subject for at least one data element of a data feed; identifying a use-case for the data feed; assigning a security label to the use-case that includes a data sensitivity rating of the use-case; comparing a clearance of the subject to the security label of the use-case; upon determining that the clearance of the subject is at or above the data sensitivity rating of the use-case, allowing the subject access privilege to the data feed via the secure data corridor; and assigning an additional data sensitivity rating to the secure data corridor that corresponds with or is substantially similar to a particular data sensitivity rating of the data feed that is transmitted through the secure data corridor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium having stored thereon a plurality of sequences of instructions which, when executed by a processor, cause the processor to perform a plurality of actions comprising:
-
receiving a request from a subject for at least one data element of a data feed; identifying a use-case for the data feed; assigning a security label to the use-case that includes a data sensitivity rating of the use-case; comparing a clearance of the subject to the security label of the use-case; upon determining that the clearance of the subject is at or above the data sensitivity rating of the use-case, allowing the subject access privilege to the data feed via a secure data corridor; and assigning an additional data sensitivity rating to the secure data corridor that corresponds with or is substantially similar to a particular data sensitivity rating of the data feed that is transmitted through the secure data corridor. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification