×

Dynamic file access control and management

  • US 7,660,902 B2
  • Filed: 11/20/2001
  • Issued: 02/09/2010
  • Est. Priority Date: 11/20/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method performed by a proxy server, the method comprising:

  • receiving, over a first network connection, a Network File System (NFS) based request from a client machine for a data block of a data file from a remote network attached storage system, the request having an associated user, the data block having a fixed preconfigured size associated with the data file;

    requesting, from an authentication server, an access policy associated with the associated user;

    receiving, from the authentication server, the access policy associated with the associated user;

    determining, from the access policy associated with the associated user and metadata associated with the data file, the metadata being stored on the remote network attached storage system, if the associated user has the authority to access the data file; and

    if the associated user has the authority to access the data file, then;

    establishing a set of usage rights based on the access policy associated with the associated user and the metadata associated with the data file;

    requesting, over a second network connection, from the network attached storage system, the data block of the data file;

    receiving, over the second network connection, from the network attached storage system, the data block of the data file;

    encrypting the received data block, such that only an authorized client module executing on the client machine by the associated user can decrypt the encrypted received data block;

    encapsulating within a packet;

    the encrypted received data block; and

    the established set of usage rights; and

    sending, over a secure channel, the packet to the client machine such that only the authorized client module can access the encrypted received data block and only when such access is in accordance with the established set of usage rights, said authorized client module running transparently to the associated user, logically interposed between an application layer and an operating system kernel layer.

View all claims
  • 16 Assignments
Timeline View
Assignment View
    ×
    ×