Transparent interceptors for privacy policy implementation
First Claim
Patent Images
1. A system for applying a privacy policy to an application, comprising:
- a data store on a computer readable storage media adapted to maintain a plurality of privacy policies;
an existing middleware mechanism stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to facilitate an exchange of messages between at least one client and a plurality of applications, the existing middleware mechanism comprising a plurality of message interceptors and the middleware mechanism executable to receive a request from the at least one client to access private information associated with one of the plurality of applications; and
an interceptor logic component stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to register with at least one message interceptor of the plurality of message interceptors in the existing middleware mechanism, andthe interceptor logic component executable to authorize access to the private information associated with the one of the plurality of applications when a result of applying at least one of the plurality of privacy policies associated with the one of the plurality of applications to contents of the request received by the middleware mechanism indicates that access to the private information is authorized.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for applying a privacy policy to an application is provided. The system comprises a data store adapted to defining at least one privacy policy. The system also comprises an interceptor logic component operable to authorize access to information based on the at least one privacy policy. The system further comprises a middleware mechanism operable to receive a request for a service provided by the application, wherein the request relates to private data, to request the interceptor logic component to authorize the request, and to reject the request for the service for an unauthorized request.
20 Citations
18 Claims
-
1. A system for applying a privacy policy to an application, comprising:
-
a data store on a computer readable storage media adapted to maintain a plurality of privacy policies; an existing middleware mechanism stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to facilitate an exchange of messages between at least one client and a plurality of applications, the existing middleware mechanism comprising a plurality of message interceptors and the middleware mechanism executable to receive a request from the at least one client to access private information associated with one of the plurality of applications; and an interceptor logic component stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to register with at least one message interceptor of the plurality of message interceptors in the existing middleware mechanism, and the interceptor logic component executable to authorize access to the private information associated with the one of the plurality of applications when a result of applying at least one of the plurality of privacy policies associated with the one of the plurality of applications to contents of the request received by the middleware mechanism indicates that access to the private information is authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for controlling access to private data, comprising:
-
a broker stored as a set of computer readable instructions in a computer readable storage media executable by a processor to receive a request for service from a requestor, the request for service associated with an application; and an authorization component stored as a set of computer readable instructions in a computer readable storage media executable by a processor to determine whether the request for service received by the broker involves access to private data associated with the application; the authorization component executable to query the requestor for additional information about the requestor; the authorization component executable to determine whether a privacy policy of the application associated with the private data permits access to the private data; and the broker executable to provide the request for services based on the determination of the authorization component. - View Dependent Claims (16, 17)
-
-
18. A computer readable storage medium having stored thereon computer executable code comprising:
-
an existing middleware mechanism stored as a set of computer readable instructions in the computer readable storage medium and executable by a processor to facilitate an exchange of messages between a client and a plurality of applications, the existing middleware mechanism comprising a plurality of message interceptors, and the existing middleware mechanism receives a request from the client to access private information associated with one of the plurality of applications; and an interceptor logic component stored as a set of computer readable instructions in the computer readable storage medium and executable by a processor to register with at least one message interceptor of the plurality of message interceptors in the existing middleware mechanism, and the interceptor logic component authorizes access to the private information associated with the one of the plurality of applications when a result of applying at least one of the plurality of privacy policy policies associated with the one of the plurality of applications to contents of the request received by the existing middleware mechanism indicates that access to the private information is authorized.
-
Specification