Data management apparatus, data management method and program thereof
First Claim
Patent Images
1. A data-management apparatus that determines whether or not authorization has been given to access data in response to an access request to the data from a user, the apparatus comprising:
- an access-authorization-memory unit operable to correlate and store data identifiers that are capable of identifying the data, and access-authorized-user identifiers that are capable of identifying users that can access the data;
an access-analysis unit operable to obtain a user identifier for a user performing an access request and a data identifier for data that is a target of that access from the access request;
an access-authorized-user-acquisition unit operable to obtain an access-authorized-user identifier that correlate to the data identifier obtained by the access-analysis unit within the access-authorization-memory unit;
an access-authorization-judgment unit operable to compare the user identifier obtained by the access-analysis unit with the access-authorized-user identifier obtained by the access-authorized-user-acquisition unit; and
a user-information-provider unit operable to provide information about other users that are authorized to access the data for which the user performed an access request when it was determined by the access-authorization-judgment unit that access of the data is not authorized.
2 Assignments
0 Petitions
Accused Products
Abstract
This invention is a data-management apparatus, data-management method and program thereof that improve convenience for a user that does not have authorization to access data without sacrificing the security of the data. This invention is a data-management apparatus, data-management method and program thereof that comprises a user-information-provider unit that provides information to the user about other users that are authorized to access data when the user is not authorized to access data.
-
Citations
13 Claims
-
1. A data-management apparatus that determines whether or not authorization has been given to access data in response to an access request to the data from a user, the apparatus comprising:
-
an access-authorization-memory unit operable to correlate and store data identifiers that are capable of identifying the data, and access-authorized-user identifiers that are capable of identifying users that can access the data;
an access-analysis unit operable to obtain a user identifier for a user performing an access request and a data identifier for data that is a target of that access from the access request;
an access-authorized-user-acquisition unit operable to obtain an access-authorized-user identifier that correlate to the data identifier obtained by the access-analysis unit within the access-authorization-memory unit;
an access-authorization-judgment unit operable to compare the user identifier obtained by the access-analysis unit with the access-authorized-user identifier obtained by the access-authorized-user-acquisition unit; and
a user-information-provider unit operable to provide information about other users that are authorized to access the data for which the user performed an access request when it was determined by the access-authorization-judgment unit that access of the data is not authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A data-management method that determines whether or not authorization has been given to access data in response to an access request to the data from a user, the method comprising:
-
an access-analysis step of obtaining a user identifier for a user performing an access request and a data identifier for data that is a target of that access from the access request;
an access-authorized-user-acquisition step that, based on a data identifier obtained by the access-analysis step, obtains a corresponding access-authorized-user identifier within an access-authorization-memory unit that correlates and stores data identifiers that are capable of identifying the data, and access-authorized-user identifiers that are capable of identifying users that can access the data;
an access-authorization-judgment step that compares the user identifier obtained by the access-analysis step with the access-authorized-user identifier obtained by the access-authorized-user-acquisition step; and
a user-information-provision step that provides information about other users that are authorized to access the data for which the user performed an access request when it was determined by the access-authorization-judgment step that access of the data is not authorized.
-
-
12. A program that determines whether or not authorization has been given to access data in response to an access request to the data from a user, and causes a computer to execute:
-
an access-analysis step of obtaining a user identifier for a user performing an access request and a data identifier for data that is the target of that access according to the access request;
an access-authorized-user-acquisition step that, based on a data identifier obtained by the access-analysis step, obtains a corresponding access-authorized-user identifier within an access-authorization-memory unit that correlates and stores data identifiers that are capable of identifying the data, and access-authorized-user identifiers that are capable of identifying users;
an access-authorization-judgment step that compares the user identifier obtained by the access-analysis step with the access-authorized-user identifier obtained by the access-authorized-user-acquisition step; and
a user-information-provision step that provides information about other users that are authorized to access the data for which the user performed an access request when it was determined by the access-authorization-judgment step that access of the data is not authorized.
-
-
13. A computer-readable storage medium for storing program that determines whether or not authorization has been given to access data in response to an access request to the data from a user, and causes a computer to execute:
-
an access-analysis step of obtaining a user identifier for a user performing an access request and a data identifier for data that is the target of that access according to the access request;
an access-authorized-user-acquisition step that, based on a data identifier obtained by the access-analysis step, obtains a corresponding access-authorized-user identifier within an access-authorization-memory unit that correlates and stores data identifiers that are capable of identifying the data, and access-authorized-user identifiers that are capable of identifying users;
an access-authorization-judgment step that compares the user identifier obtained by the access-analysis step with the access-authorized-user identifier obtained by the access-authorized-user-acquisition step; and
a user-information-provision step that provides information about other users that are authorized to access the data for which the user performed an access request when it was determined by the access-authorization-judgment step that access of the data is not authorized.
-
Specification