Methods and Apparatus for Implementing Context-Dependent File Security
First Claim
1. A signal-bearing medium tangibly embodying a program of machine readable instructions executable by a digital processing apparatus of a computer system to perform context-based file security operations, the operations comprising:
- receiving a selection of at least one context-based permission to be applied to at least one file stored in a computer memory resource associated with the computer system, whereby the at least one context-based permission will be used by the computer system to control access to the at least one file; and
saving the at least one context-based permission to a memory of the computer system as context-based permission information.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
-
Citations
32 Claims
-
1. A signal-bearing medium tangibly embodying a program of machine readable instructions executable by a digital processing apparatus of a computer system to perform context-based file security operations, the operations comprising:
-
receiving a selection of at least one context-based permission to be applied to at least one file stored in a computer memory resource associated with the computer system, whereby the at least one context-based permission will be used by the computer system to control access to the at least one file; and saving the at least one context-based permission to a memory of the computer system as context-based permission information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A signal-bearing medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus of a computer system to perform context-based file security operations concerning at least one file stored in a computer memory resource associated with the computer system, the operations comprising:
-
monitoring access requests for files stored in the computer memory resource associated with the computer system; detecting a particular access request for files stored in the computer memory resource, where the particular access request encompasses the at least one file; retrieving context-based permission information associated with the at least one file, where the context-based permission information concerns a context-based permission used to control access to the at least one file; deriving user context information from the particular access request; comparing the context-based permission saved in the context-based permission information to the user context information derived from the particular access request; and granting access to the file if the context-based permission and user context information match.
-
-
25. A signal-bearing medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus of a computer system to perform context-based security operations, the operations comprising:
-
receiving a selection of at least one context-based permission to be applied to at least one computer system resource associated with the computer system, whereby the at least one context-based permission will be used by the computer system to control access to the at least one computer system resource; and saving the at least one context-based permission to a memory of the computer system as context-based permission information. - View Dependent Claims (26, 27)
-
-
28. A computer system for performing context-based security operations concerning at least one computer system resource, the computer system comprising:
-
at least one memory to store at least one program of machine-readable instructions, where the at least one program performs context-based security operations concerning the at least one computer system resource when executed; at least one processor coupled to the at least one memory and computer system resource, where the at least one processor performs at least the following operations when the at least one program is executed; receiving at least one selection of a context-based permission to be applied to the at least one computer system resource, whereby the context-based permission will be used by the computer system to control access to the at least one computer system resource; and saving the at least one context-based permission to a memory of the computer system as context-based permission information. - View Dependent Claims (29, 30)
-
-
31. A computer system for performing context-based security operations concerning at least one computer system resource, the computer system comprising:
-
at least one memory to store at least one program of machine-readable instructions, where the at least one program performs context-based security operations concerning the at least one computer system resource when executed; at least one processor coupled to the at least one memory, where the at least one processor performs at least the following operations when the at least one program is executed; monitoring access to the at least one computer system resource; detecting an attempt to access the at least one computer system resource; retrieving the context-based permission information; deriving user context information from the access attempt; comparing the context-based permission saved in the context-based permission information to the user context information derived from the access attempt; and granting access to the computer system resource if the context-based permission and user context information match. - View Dependent Claims (32)
-
Specification