Secure compartmented mode knowledge management portal
First Claim
Patent Images
1. A layered defense-in-depth knowledge-based management system, comprising:
- a reception zone for authenticating a user for access to the system;
an operations zone for adjudicating on a user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users.
1 Assignment
0 Petitions
Accused Products
Abstract
A layered defense-in-depth knowledge-based data management comprises a reception zone for authenticating a user for access to the system and an operations zone for adjudicating on a user level access to data objects stored in the system database. In addition, the data management comprises a security zone for issuing certificates of accessibility for defined users and a screening zone to interrogate data packets during processing thereof. The first line of defense is firewall protection and packet filtering preceding the reception zone.
29 Citations
15 Claims
-
1. A layered defense-in-depth knowledge-based management system, comprising:
-
a reception zone for authenticating a user for access to the system;
an operations zone for adjudicating on a user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A layered defense-in-depth knowledge-based management system, comprising:
-
a reception zone for authenticating a user for access to the system;
a screening zone to interrogate data packets during processing thereof;
an operations zone for adjudicating on the user level access to the data objects stored in a system database; and
a security zone for issuing certificates of accessibility for defined users, revoke certificates for users no longer allowed access to the system, and performing key recovering operations. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of layered defense-in-depth knowledge-based management, comprising:
-
authenticating a user of the knowledge base;
determine the clearance level of a requested document by the authenticated user;
determine the clearance level of the authenticated user;
comparing the clearance level of the document with the clearance level of the authenticated user; and
displaying the secure document to the authenticated user in response to the clearance level of the user dominating the clearance level of the requested document. - View Dependent Claims (12, 13, 14, 15)
-
Specification