PERMISSION CONTROL
First Claim
1. A computer-readable medium containing instructions to configure at least one processor to cause operations comprising:
- receiving a request to access data;
determining, from the request, one or more attributes representative of an identity of an entity making the request and a type of the data;
sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database;
approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database;
rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database; and
sending, by the permission controller, a conflict request to add another use case to the use case database, when the response to the query indicates the matching use case was not found in the use case database.
1 Assignment
0 Petitions
Accused Products
Abstract
In some example implementations, there is provided a method including determining, from a received request, one or more attributes; sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database; approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database; rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database.
-
Citations
20 Claims
-
1. A computer-readable medium containing instructions to configure at least one processor to cause operations comprising:
-
receiving a request to access data; determining, from the request, one or more attributes representative of an identity of an entity making the request and a type of the data; sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database; approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database; rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database; and sending, by the permission controller, a conflict request to add another use case to the use case database, when the response to the query indicates the matching use case was not found in the use case database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
at least one processor; and at least one memory including program code which when executed by the at least one processor causes operations comprising; receiving a request to access data; determining, from the request, one or more attributes representative of an identity of an entity making the request and a type of the data; sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database; approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database; rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database; and sending, by the permission controller, a conflict request to add another use case to the use case database, when the response to the query indicates the matching use case was not found in the use case database. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving a request to access data; determining, from the request, one or more attributes representative of an identity of an entity making the request and a type of the data; sending, by a permission controller, a query to a use case database, the query including the determined attributes to enable an identification by the use case database of a matching use case stored in the use case database; approving, by the permission controller, the requested access to the data, when a response to the query indicates the matching use case was found in the use case database; rejecting, by the permission controller, the requested access to the data, when the response to the query indicates the matching use case was not found in the use case database; and sending, by the permission controller, a conflict request to add another use case to the use case database, when the response to the query indicates the matching use case was not found in the use case database. - View Dependent Claims (19, 20)
-
Specification