Securing information in a design collaboration and trading partner environment
First Claim
1. A method for controlling access to sensitive information, including storing an object securely at an object storage location logically remote from the location of the owner of said object;
- receiving a request for access to said object from a requester;
authenticating said requestor at a location logically remote from the location where said object is stored; and
granting access to said object.
4 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a method and system for providing distributed, secure access to sensitive information. An owner of a data object causes the object to be placed at a secure location logically remote to the owner. The object resides in an electronic vault which itself resides in a protected workspace. A trading partner may be given access to both the workspace and the vault through a decentralized authentication process using an access control entity. Upon determining that the trading partner should be given access to the object, the access control entity provides the trading partner access to the vault and the object. At the discretion of the object owner, attempting to access the object may trigger a Nondisclosure Agreement or other administrative task to be completed prior to granting access to the object. Data relating to access and attempts to access protected objects are recorded in a computerized log.
-
Citations
32 Claims
-
1. A method for controlling access to sensitive information, including
storing an object securely at an object storage location logically remote from the location of the owner of said object; -
receiving a request for access to said object from a requester;
authenticating said requestor at a location logically remote from the location where said object is stored; and
granting access to said object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
- 15. The method of 14, wherein said granting further includes unlocking access to a vault.
-
17. An apparatus for controlling access to sensitive information, including
means for storing an object securely at an object storage location logically remote from the location of the owner of said object; -
means for receiving a request for access to said object from a requestor;
means for authenticating said requestor at a location logically remote from the location where said object is stored; and
means for granting access to said object. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
- 31. The apparatus of 30, wherein said means for granting further includes means for unlocking access to a vault.
Specification