Secure compartmented mode knowledge management portal
First Claim
Patent Images
1. A layered defense-in-depth knowledge-based management system, comprising:
- a reception zone for authenticating a user for access to the system;
an operations zone for adjudicating on a user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users.
1 Assignment
0 Petitions
Accused Products
Abstract
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level access to data objects stored in the system database. In addition, the data management comprises a security zone for issuing certificates of accessibility for defined users and a screening zone to interrogate data packets during processing thereof. The first line of defense is firewall protection and packet filtering preceding the reception zone.
132 Citations
21 Claims
-
1. A layered defense-in-depth knowledge-based management system, comprising:
-
a reception zone for authenticating a user for access to the system;
an operations zone for adjudicating on a user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A layered defense-in-depth knowledge-based management system, comprising:
-
a reception zone for authenticating a user for access to the system;
a screening zone to interrogate data packets during processing thereof;
an operations zone for adjudicating on the user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users, revoke certificates for users no longer allowed access to the system, and performing key recovering operations. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of layered defense-in-depth knowledge-based management, comprising:
-
authenticating a user of the knowledge base;
determine the clearance level of a requested document by the authenticated user;
determine the clearance level of the authenticated user;
comparing the clearance level of the document with the clearance level of the authenticated user; and
displaying the secure document to the authenticated user in response to the clearance level of the user dominating the clearance level of the requested document. - View Dependent Claims (12, 13, 14, 16, 18, 19, 20, 21)
-
-
15. A method of layered defense-in-depth knowledge-based management, comprising:
-
authenticating a user of the knowledge base;
determine the clearance level of a requested secure document;
determine the clearance level of the authenticated user;
comparing the clearance level of the requested document with the clearance level of the authenticated user;
obtain a document caveat;
obtain an authenticated user caveat;
comparing the authenticated user caveat with the document caveat to allow access to the obtained document caveat;
determining the access allowability of the obtained document caveat;
determine the allowance of both the document caveat and the clearance access to identify clearance of the authorized user to the requested secure document; and
displaying the secure document to the authenticated user.
-
-
17. A method of accessing an electronic support library for layered defense-in-depth knowledge-based management, comprising:
-
authenticating in a reception zone a user in response to a request for data;
document manipulation and administration in an operations zone of a request by an authenticated user; and
issuing authorization certificates in a security zone for users to allow access to data managed in the operations zone.
-
Specification