METHOD AND SYSTEM FOR CROSS-DOMAIN DATA SECURITY
First Claim
Patent Images
1. A data management system, comprising:
- a microprocessor; and
a data manager executing on the microprocessor and communicatively coupled to a first domain and a second domain, comprising;
a first domain security process associated with a first domain security policy and operable to provide access to first domain data based on the first domain security policy; and
a second domain security process associated with a second domain security policy and operable to provide access to first domain data based on the second domain security policy.
1 Assignment
0 Petitions
Accused Products
Abstract
A data management system includes a microprocessor and a data manager executing on the microprocessor. The data manager is communicatively coupled to a first domain and a second domain and includes a first domain security process associated with a first domain security policy and operable to provide access to first domain data based on the first domain security policy. The data manager further includes a second domain security process associated with a second domain security policy and operable to provide access to first domain data based on the second domain security policy.
-
Citations
19 Claims
-
1. A data management system, comprising:
-
a microprocessor; and a data manager executing on the microprocessor and communicatively coupled to a first domain and a second domain, comprising; a first domain security process associated with a first domain security policy and operable to provide access to first domain data based on the first domain security policy; and a second domain security process associated with a second domain security policy and operable to provide access to first domain data based on the second domain security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a microprocessor; and a data manager executing on the microprocessor and to couple of a first domain and a second domain, comprising; a plurality of domain security processes to receive of a plurality of domain security policies associated with the first domain and to enable access to first domain data based on the plurality of domain security policies; and a configuration process to configure the domain security processes independently of each other and to configure the data manager independently of the domain security processes. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
configuring a data manager to enable data security between a first domain and a second domain; in the data manager, receiving a plurality of first domain security policies associated with the first domain; configuring the first domain security policies independently of each other and independently of said configuration of the data manager; and receiving first domain data and validating the first domain data based on the plurality of first domain security policies and rendering the first domain data to the second domain. - View Dependent Claims (16, 17)
-
-
18. The method of 15, further comprising:
receiving a plurality of second domain security policies associated with the second domain, said validation of the first domain data further comprising validating the first domain data based on the plurality of second domain security policies. - View Dependent Claims (19)
Specification