×

Method and apparatus for providing secure access control for protected information

  • US 20070136603A1
  • Filed: 10/20/2006
  • Published: 06/14/2007
  • Est. Priority Date: 10/21/2005
  • Status: Abandoned Application
First Claim
Patent Images

1. A method of processing a request from a requester, comprising:

  • receiving from a requestor a first request comprising at least one desired operation set of indicia and at least one target identification set of indicia, said desired operation set of indicia comprising a set of indicia which is representative of at least one desired operation, each said target identification set of indicia comprising a set of indicia which is representative of a target, said target comprising at least one element, said element comprising an information set of indicia, said information set of indicia being representative of information;

    determining whether a local domain contains all of said at least one element in said target, said local domain comprising at least one processor;

    if said local domain contains all of said at least one element in said target;

    (1) if said local domain contains a rule for each element in said target indicating that said requestor is authorized to perform said desired operation on said element;

    (a) enabling a first agent to access said at least one element to perform said desired operation, and (b) transmitting to said requester a first agent location set of indicia, said first agent location set of indicia enabling said requestor to access said first agent;

    (2) if said local domain does not contain a rule for each element in said target indicating that said requestor is authorized to perform said desired operation on said target;

    (a) denying said request;

    if said local domain contains at least one element in said target but does not contain all of said at least one element in said target;

    (1) if said local domain contains a rule for each said element contained in said local domain indicating that said requestor is authorized to perform said desired operation on said at least one element in said target;

    (a) creating a second request, said second request comprising (1) said at least one desired operation set of indicia and (2) a secondary target identification set of indicia comprising a set of indicia which is representative of all elements which are both (i) contained in said target and (ii) not contained in said local domain; and

    (2) if said local domain does not contain a rule for each element contained in said local domain indicating that said requestor is authorized to perform said desired operation on said target;

    (a) denying said request.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×