DEVICE AND METHODS FOR MANAGEMENT AND ACCESS OF DISTRIBUTED DATA SOURCES
First Claim
1. A cloud security server comprising:
- a database management module to;
(i) associate a data source with a user account, (ii) assign one of a plurality of trust levels to data stored on the data source, (iii) associate a client device with the user account, and (iv) assign one of the plurality of trust levels to the client device;
a data source connector to broker access to data of the data source; and
a data access module to (i) receive a request from the client device for access to requested data of the data source and (ii) authenticate the client device in response to receiving the request;
wherein (i) the database management module is further to verify the request by verifying the assigned trust level of the client device has a predefined relationship with the assigned trust level of the requested data, and (ii) the data access module is further to broker access to the requested data by the client device using the data source connector in response to the database management module verifying the request.
1 Assignment
0 Petitions
Accused Products
Abstract
A device and method for provided access to distributed data sources includes a cloud security server configured to associate any number of data sources and client devices with a cloud security server account. The cloud security server assigns trust levels to the data sources and the client devices. A client device requests data from the cloud security server. The cloud security server authenticates the client device and verifies the trust levels of the client device and the requested data. If verified, the cloud security server brokers a connection between the client device and the data source, and the client device accesses the requested data. Data sources may include cloud service providers and local storage devices. The cloud security server may assign a trust level to a client device for a limited time or revoke a trust level assigned to a client device. Other embodiments are described and claimed.
85 Citations
29 Claims
-
1. A cloud security server comprising:
-
a database management module to;
(i) associate a data source with a user account, (ii) assign one of a plurality of trust levels to data stored on the data source, (iii) associate a client device with the user account, and (iv) assign one of the plurality of trust levels to the client device;a data source connector to broker access to data of the data source; and a data access module to (i) receive a request from the client device for access to requested data of the data source and (ii) authenticate the client device in response to receiving the request; wherein (i) the database management module is further to verify the request by verifying the assigned trust level of the client device has a predefined relationship with the assigned trust level of the requested data, and (ii) the data access module is further to broker access to the requested data by the client device using the data source connector in response to the database management module verifying the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method to manage cloud data access on a cloud security server, the method comprising:
-
associating, on the cloud security server, a data source with a user account; assigning, on the cloud security server, one of a plurality of trust levels to data stored on the data source; associating, on the cloud security server, a client device with the user account; assigning, on the cloud security server, one of the plurality of trust levels to the client device; receiving, on the cloud security server, a request from the client device for access to requested data of the data source;
authenticating, on the cloud security server, the client device in response to receiving the request;verifying, on the cloud security server, the request by verifying the assigned trust level of the client device has a predefined relationship with the assigned trust level of the requested data in response to authenticating the client device; and brokering, on the cloud security server, access to the requested data by the client device in response to verifying the request. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more non-transitory, machine readable media comprising a plurality of instructions that in response to being executed result in a cloud security server:
-
associating, on the cloud security server, a data source with a user account; assigning, on the cloud security server, one of a plurality of trust levels to data stored on the data source; associating, on the cloud security server, a client device with the user account; assigning, on the cloud security server, one of the plurality of trust levels to the client device; receiving, on the cloud security server, a request from the client device for access to requested data of the data source; authenticating, on the cloud security server, the client device in response to receiving the request; verifying, on the cloud security server, the request by verifying the assigned trust level of the client device has a predefined relationship with the assigned trust level of the requested data in response to authenticating the client device; and brokering, on the cloud security server, access to the requested data by the client device in response to verifying the request. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. One or more machine readable storage media comprising a plurality of instructions stored thereon that, in response to being executed, result in a computing device:
-
receiving an invitation to access data of a data source from the cloud security server on the client device; authenticating the client device to the cloud security server; sending a request from the client device to the cloud security server for access to the data of a data source; and
accessing the requested data on the client device as a function of a trust level assigned to the client device and a trust level assigned to the requested data. - View Dependent Claims (27, 28, 29)
-
Specification