Novel Technology for Securing Access to an Enterprise Information System Through a Natural Language Interface
First Claim
1. A method for securing natural language access to enterprise information, the method comprising:
- (a) receiving a request for access to enterprise information from a user through a natural language interface, wherein the request for access is entered by the user through a user device and includes an indication of the user'"'"'s identity;
(b) determining, based on the indication of the user'"'"'s identity, whether the user is authorized for the requested access;
(c) formulating a response to the request for access to enterprise information based on whether the user is authorized for the requested access;
(d) choosing, based on the enterprise information to which the user requested access, a communication channel for responding to the request for access to enterprise information; and
(e) initiating sending of the response.
1 Assignment
0 Petitions
Accused Products
Abstract
Technology for securing a user'"'"'s access to enterprise information through a natural language interface is disclosed. A system for securing access includes computer structures working in concert to identify the user'"'"'s access permissions based on the initial request, collect further information from the user as required to update or further determine the user'"'"'s permissions, and to choose a response communication channel appropriate to the user'"'"'s request. A method for securing access includes receiving a request from a user, determining the user'"'"'s access permissions, formulating a response based on the user'"'"'s permissions, choosing the appropriate communication channel for the response, and initiating transmission of the response.
-
Citations
20 Claims
-
1. A method for securing natural language access to enterprise information, the method comprising:
-
(a) receiving a request for access to enterprise information from a user through a natural language interface, wherein the request for access is entered by the user through a user device and includes an indication of the user'"'"'s identity; (b) determining, based on the indication of the user'"'"'s identity, whether the user is authorized for the requested access; (c) formulating a response to the request for access to enterprise information based on whether the user is authorized for the requested access; (d) choosing, based on the enterprise information to which the user requested access, a communication channel for responding to the request for access to enterprise information; and (e) initiating sending of the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer system for securely processing a user'"'"'s natural-language request for access to enterprise information, the computer system comprising:
-
(a) a means for determining, based on a user'"'"'s natural-language request for access to enterprise information, whether the user is authorized for access to enterprise information requested by the user; (b) a means for collecting and processing further information from the user, wherein the collecting and processing the further information is to further determine whether the user is authorized for the requested access to enterprise information; and (c) a means for choosing a communication channel based on the requested access.
-
-
17. A computer system for securing natural language access to enterprise information, the system comprising a processor configured to:
-
(a) receive a request for access to enterprise information from a user through a natural language interface wherein the request includes user-identifying information; (b) determine whether the user is authorized for the requested access to enterprise information by comparing the user-identifying information with a list of authorized users, wherein the list includes entries defining, for each authorized user on the list, a permitted access to enterprise information for the authorized user; and (c) choose a communications channel based on the enterprise information to which the user requests access by comparing the enterprise information to which the user requests access to a list of enterprise information, wherein the list includes entries defining a communication channel for each item of enterprise information on the list. - View Dependent Claims (18, 19, 20)
-
Specification