×

Protecting Data From Unauthorized Access

  • US 20170012982A1
  • Filed: 07/10/2015
  • Published: 01/12/2017
  • Est. Priority Date: 07/10/2015
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • identifying, by a computing system, that an application program does not have permission to access a first type of data that is provided by a first application program;

    identifying, by the computing system, that a second application program has permission to access the first type of data that is provided by the first application program, wherein the second application program provides a second type of data and is able to modify the second type of data to include the first type of data;

    identifying, by the computing system, that the application program has permission to access the second type of data that is provided by the second application program;

    determining, by the computing system, that the second type of data that is provided by the application program and that the application program has permission to access, includes the first type of data; and

    performing, by the computing system as a result of having determined that the second type of data includes the first type of data, an action to prevent the first type of data from being provided, in the second type of data, from the second application program to the application program, without user authorization.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×