SYSTEM AND METHOD FOR DATA PRIVACY IN URL BASED CONTEXT QUERIES
First Claim
1. A method comprising the steps of:
- receiving a reference to a data object from a user;
identifying, via the network, at least one entity that controls the data object;
retrieving, via the network, at least one permission for the data object, wherein the at least one permission is associated with the at least one entity that controls the data object;
determining, via the network, if the user is permitted to access to the data object using the at least one permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the at least one permission for the data object, whereinif the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for data privacy in URL based context queries. A reference to a data object is received from a user. At least one entity that controls the data object is identified via the network. At least one permission for the data object is retrieved via the network, wherein the permission is associated with the entity that controls the data object. It is then determined, via the network, if the user is permitted to access to the data object using the permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the permission for the data object. If the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object.
230 Citations
27 Claims
-
1. A method comprising the steps of:
-
receiving a reference to a data object from a user; identifying, via the network, at least one entity that controls the data object; retrieving, via the network, at least one permission for the data object, wherein the at least one permission is associated with the at least one entity that controls the data object; determining, via the network, if the user is permitted to access to the data object using the at least one permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the at least one permission for the data object, wherein if the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
an object reference receiving module that receives references to data objects from users; a controlling entity identification module that identifies, for each reference to a data object received by the object reference receiving module, at least one entity that controls the data object; a permission retrieval module that retrieves, for each reference to a data object received by the object reference receiving module and processed by the permission retrieval module, at least one permission for the data object, wherein the at least one permission is associated with the at least entity that controls the data object; a permission determination module that determines, via the network, for each reference to a data object received by the object reference receiving module and processed by the permission retrieval module and the permission retrieval module, if the user associated with the reference to a data object is permitted to access to the data object using the at least one permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the at least one permission for the data object, wherein if the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable medium having computer-executable instructions for a method comprising the steps:
-
receiving a reference to a data object from a user; identifying, via the network, at least one entity that controls the data object; retrieving, via the network, at least one permission for the data object, wherein the at least one permission is associated with the at least one entity that controls the data object; determining, via the network, if the user is permitted to access to the data object using the at least one permission for the data object and spatial data, temporal data social data and logical data available to the network that relates to the user and to the at least one permission for the data object, wherein if the user is permitted access to the data object, access is granted to the data object, and if the user is nor permitted access to the data object, access is denied to the data object. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
Specification