METHOD, SYSTEM AND PROGRAM PRODUCT FOR VERIFYING ACCESS TO A DATA OBJECT
First Claim
Patent Images
1. A computer-implemented method of verifying access to a data object, the method comprising:
- automatically determining whether access to the data object requires verification;
obtaining an owner for the data object;
obtaining a set of current users having access to the data object;
providing the set of current users to the owner; and
receiving a set of verified users.
1 Assignment
0 Petitions
Accused Products
Abstract
An improved solution for verifying access to a data object. In particular, the invention automatically determines when access to the data object requires verification and provides an owner of the data object a set of current users for verification. The set of current users can include all or a subset of the users/user groups that have access to the data object. Additionally, an indication of one or more attributes of each user can be provided to the owner to assist in verification. Access information can be updated based on a response from the owner.
-
Citations
23 Claims
-
1. A computer-implemented method of verifying access to a data object, the method comprising:
-
automatically determining whether access to the data object requires verification;
obtaining an owner for the data object;
obtaining a set of current users having access to the data object;
providing the set of current users to the owner; and
receiving a set of verified users. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method of requesting verification of access to a data object, the method comprising:
-
obtaining a frequency period for verifying access to the data object;
obtaining a previous time that the access was verified for the data object;
determining that the frequency period has passed since the previous time;
obtaining an owner for the data object; and
sending a request to the owner to verify access to the data object. - View Dependent Claims (10, 11, 12)
-
-
13. A system for verifying access to a data object, the system comprising:
-
a monitor system for automatically determining when access to the data object requires verification;
an owner system for obtaining an owner for the data object;
a selection system for obtaining a set of current users having access to the data object; and
a verification system for providing the set of current users to the owner. - View Dependent Claims (14, 15, 16)
-
-
17. A program product stored on a recordable medium for verifying access to a data object, which when executed comprises:
-
program code for automatically determining when access to the data object requires verification;
program code for obtaining an owner for the data object;
program code for obtaining a set of current users having access to the data object; and
program code for providing the set of current users to the owner. - View Dependent Claims (18, 19, 20)
-
-
21. A system for deploying an application for requesting verification of access to a data object, the system comprising:
-
a computer infrastructure being operable to;
automatically determine when access to the data object requires verification;
obtain an owner for the data object;
obtain a set of current users having access to the data object; and
provide the set of current users to the owner. - View Dependent Claims (22)
-
-
23. Computer software embodied in a propagated signal for verifying access to a data object, the computer software comprising instructions to cause a computer system to perform the following functions:
-
automatically determine when access to the data object requires verification;
obtain an owner for the data object;
obtain a set of current users having access to the data object;
provide the set of current users to the owner;
receive a set of verified users; and
update the set of current users based on the set of verified users.
-
Specification