×

Proactive Information Security Management

  • US 20090300002A1
  • Filed: 05/26/2009
  • Published: 12/03/2009
  • Est. Priority Date: 05/28/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for controlling access to sensitive information, the method comprising:

  • maintaining access constraint data that can be used to control access to said sensitive information, wherein said access constraint data comprises match pattern data and apply pattern data;

    receiving a semantic query from a querier requesting access to said sensitive information;

    based on said match pattern data, determining whether said semantic query should be constrained according to said apply pattern data;

    where said semantic query should be constrained according to said apply pattern data, rewriting said semantic query according to said apply pattern data to produce a rewritten query;

    executing said rewritten query against a database that contains said sensitive information; and

    returning any results of executing said rewritten query.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×