SYSTEMS AND METHODS FOR VALIDATED SECURE DATA ACCESS
First Claim
1. A method for securing access to stored data, the method comprising:
- restricting, by a storage management computing system, access to stored data to entities having associated access claims that are endorsed by a trusted third party, by;
receiving from a first entity an indication of stored data to be shared;
receiving from the first entity multiple access criteria for validating an access to the stored data;
receiving from a second entity a request to access the stored data;
receiving from the second entity data items corresponding to each of the multiple access criteria; and
transmitting the stored data to the second entity only when the data item corresponding to at least one of the multiple access criteria is validated based on an endorsement received from a trusted third party.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and techniques for securing access to stored data are provided. Example embodiments provide a Storage Management System (“SMS”) that is configured to facilitate protected information sharing. The SMS may restrict access to shared information based on one or more criteria that validate an entity'"'"'s right to access the information. For example, the SMS may restrict access to entities that are located in a particular geographic region, that are using a particular type of hardware or software, that hold particular credentials, or the like. In some cases, the SMS may require that an entity'"'"'s claim to meet on or more required criteria be validated by a trusted third party.
89 Citations
23 Claims
-
1. A method for securing access to stored data, the method comprising:
restricting, by a storage management computing system, access to stored data to entities having associated access claims that are endorsed by a trusted third party, by; receiving from a first entity an indication of stored data to be shared; receiving from the first entity multiple access criteria for validating an access to the stored data; receiving from a second entity a request to access the stored data; receiving from the second entity data items corresponding to each of the multiple access criteria; and transmitting the stored data to the second entity only when the data item corresponding to at least one of the multiple access criteria is validated based on an endorsement received from a trusted third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
22. A system for securing access to stored data, the system comprising:
-
a processor; a memory; and a module that is stored in the memory and that is configured, when executed by the processor, to perform a method comprising; receiving from a first entity an indication of stored data to be shared; receiving from the first entity multiple access criteria for validating an access to the stored data; receiving from a second entity a request to access the stored data; receiving from the second entity data items corresponding to each of the multiple access criteria; and transmitting the stored data to the second entity only when the data item corresponding to at least one of the multiple access criteria is validated based on an endorsement received from a trusted third party.
-
-
23. A non-transitory computer-readable medium including contents that are configured, when executed, to cause a computing system to perform a method for securing access to stored data, the method comprising:
-
receiving from a first entity an indication of stored data to be shared; receiving from the first entity multiple access criteria for validating an access to the stored data; receiving from a second entity a request to access the stored data; receiving from the second entity data items corresponding to each of the multiple access criteria; and transmitting the stored data to the second entity only when the data item corresponding to at least one of the multiple access criteria is validated based on an endorsement received from a trusted third party.
-
Specification