INFORMATION RECORD INFRASTRUCTURE, SYSTEM AND METHOD
First Claim
1. An method for security mediation, comprising:
- receiving a user information request;
querying an automated index to determine which of a plurality of remote databases stores information responsive to the request;
querying an automated security rule base containing rules applicable to information responsive to the request stored in the plurality of remote databases;
automatically communicating to each of the plurality of remote databases which store information responsive to the request;
authorization information, a query corresponding to the request, and at least a subset of the rules applicable to information responsive to the request;
receiving at least a status response from at least one of the plurality of remote databases which store information responsive to the request;
automatically indexing information responsive to the request from a plurality of remote databases in a manner which permits application of the rules; and
communicating at least the index of the responsive information.
6 Assignments
0 Petitions
Accused Products
Abstract
A security mediator, comprising an input configured to receive a user information request; an automated index, stored in a memory, configured to store information for determining which of a plurality of remote databases stores information responsive to the request; an automated security rule base, stored in a memory, containing rules applicable to information responsive to the request stored in the plurality of remote databases; a communication port configured to communicate to a plurality of remote databases which store information responsive to the request: security information, a query corresponding to the request and associated rules applicable to the information responsive to the request at the respective remote database; and at least one processor being configured to apply at least one security rule responsive to the query of the automated security rule base, and index information derived from a plurality of the remote databases, in a manner which permits application of the rules and which restricts insecure use of the index.
212 Citations
22 Claims
-
1. An method for security mediation, comprising:
-
receiving a user information request; querying an automated index to determine which of a plurality of remote databases stores information responsive to the request; querying an automated security rule base containing rules applicable to information responsive to the request stored in the plurality of remote databases; automatically communicating to each of the plurality of remote databases which store information responsive to the request;
authorization information, a query corresponding to the request, and at least a subset of the rules applicable to information responsive to the request;receiving at least a status response from at least one of the plurality of remote databases which store information responsive to the request; automatically indexing information responsive to the request from a plurality of remote databases in a manner which permits application of the rules; and communicating at least the index of the responsive information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A security mediation method, comprising:
-
receiving a user information request; querying an automated index to determine which of a plurality of remote databases stores information responsive to the request; querying an automated security rule base containing rules applicable to information responsive to the request stored in the plurality of remote databases; complying with at least one security rule responsive to the query of the automated security rule base; communicating to each of the plurality of remote databases which store information responsive to the request;
security information, a query corresponding to the request, and associated rules applicable to the information responsive to the request at the respective remote database;indexing information derived from a plurality of the remote databases, responsive to the request, in a manner which permits application of the rules and which restricts insecure use of the index; and communicating at least the index of the responsive information. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A security mediator, comprising:
-
an input configured to receive a user information request; an automated index, stored in a memory, configured to store information for determining which of a plurality of remote databases stores information responsive to the request; an automated security rule base, stored in a memory, containing rules applicable to information responsive to the request stored in the plurality of remote databases; a communication port configured to communicate to a plurality of remote databases which store information responsive to the request;
security information, a query corresponding to the request, and associated rules applicable to the information responsive to the request at the respective remote database; andat least one processor being configured to apply at least one security rule responsive to the query of the automated security rule base, and index information derived from a plurality of the remote databases, in a manner which permits application of the rules and which restricts insecure use of the index. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification