SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO DATA THROUGH APPLICATION VIRTUALIZATION LAYERS
First Claim
Patent Images
1. A computer-implemented method for controlling access to data, the computer-implemented method comprising:
- receiving a request to access data;
determining that an access-control policy of the data is satisfied;
activating a virtualization layer to allow access to the data after determining that the access-control policy is satisfied.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for controlling access to data is. A request to access data is received. A determination is made that an access-control policy of the data is satisfied. A virtualization layer is activated to allow access to the data after determining that the access-control policy is satisfied. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for controlling access to data, the computer-implemented method comprising:
-
receiving a request to access data; determining that an access-control policy of the data is satisfied; activating a virtualization layer to allow access to the data after determining that the access-control policy is satisfied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for controlling access to data, the computer-implemented method comprising:
-
receiving a request to access data, the request being received from a first application; determining that the first application has a right to access the data; activating a virtualization layer to allow the first application access to the data. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer-program product for controlling access to data, the computer-program product comprising a computer-readable medium having instructions thereon, the instructions comprising:
-
code programmed to receive a request to access data; code programmed to determine that an access-control policy of the data is satisfied; code programmed to activate a virtualization layer to allow access to the data after determining that the access-control policy is satisfied. - View Dependent Claims (19, 20)
-
Specification