×

DATA ACCESS CONTROL METHOD AND SYSTEM

  • US 20110131339A1
  • Filed: 12/01/2009
  • Published: 06/02/2011
  • Est. Priority Date: 12/01/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a computer processor of a computing system from a requestor, a request for access to specified data;

    extracting, by said computer processor from said request, a requestor identification string associated with said requestor;

    first verifying, by said computer processor, a match for said requestor identification string against a requestor registry;

    retrieving, by said computer processor, a service requestor identification string associated with a service requesting said specified data;

    second verifying, by said computer processor, a match for said service requestor identification string against a service registry;

    retrieving, by said computer processor, a requestor software component operating process identification string associated with a requestor software component requesting said specified data;

    third verifying, by said computer processor, a match for said requestor software component operating process identification string against a process registry;

    retrieving, by said computer processor, a requestor server identification string associated with a requestor server requesting said specified data;

    fourth verifying, by said computer processor, a match for said requestor server identification string against a server registry;

    retrieving, by said computer processor, a requestor hardware device network address and a requestor media access control (MAC) address associated with a requestor hardware device requesting said specified data;

    fifth verifying, by said computer processor, a match for said requestor hardware device network address and said requestor MAC address against a network registry;

    retrieving, by said computer processor, a requestor hardware device identification string associated with said requestor hardware device requesting said specified data;

    sixth verifying, by said computer processor, a match for said requestor hardware device identification string against a device registry;

    generating, by said computer processor, an access point door associated with a specified logical storage room representation, said logical storage room representation comprising said specified data; and

    enabling, by said computer processor based on first results of said first verifying, said second verifying, said third verifying, said fourth verifying, said fifth verifying, and said sixth verifying, access to said specified data via said access point door and said specified logical storage room representation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×