×

Rules engine architecture and implementation

  • US 7,853,786 B1
  • Filed: 12/17/2003
  • Issued: 12/14/2010
  • Est. Priority Date: 12/17/2003
  • Status: Active Grant
First Claim
Patent Images

1. A system for managing private customer data, the system comprising:

  • a data store in a computer readable storage media maintaining customer data, the customer data including privacy constraints and private customer data;

    a first security module stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to restrict access to at least one element of the private customer data based on one or more of the privacy constraints associated with the at least one element of the private customer data, wherein the privacy constraints include role related privacy rules associated with a category of the private customer data corresponding to the at least one element of the private customer data, wherein at least one of the role related privacy rules is a customer selectable rule that implements an opt-in or opt-out method, wherein the privacy constraints further include a set of security requirements and data retention requirements for the category of the private customer data that include a restricted value related to the category of the private customer data;

    a second security module stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to communicate with an application of a requesting entity desiring access to the customer data from the data store, the second security module executable to determine whether the application is a legitimate, authorized application and further denying the application access to the customer data of the data store upon determining that the application is an imposter, unauthorized application, wherein the application includes a security portion of the application programmed to communicate with the second security module to provide the second security module with parameters of the application necessary for the second security module to determine whether the application is a legitimate, authorized application; and

    a third security module stored as a set of computer readable instructions in a computer readable storage media and executable by a processor to restrict access to the customer data by the application based on a data operation to be performed by the application on the customer data, wherein the third security module permits access to the customer data upon the data operation being a read only data operation based solely on the operation being a read only data operation, and wherein the third security module determines whether to restrict access by the application to the customer data upon the data operation being a modify data operation.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×