Security system with staging capabilities
First Claim
Patent Images
1. A method comprising:
- forming access information for staging with respect to a security system, wherein the security system operates to restrict access to secured electronic data based on access information, wherein the access information includes or references one or more of access rules or access policies including at least when and where the secured electronic data can be accessed by a plurality of users, wherein the access information is based on active access information currently in use by the security system, and wherein the active access information and the access information is stored in a database operatively connected to the security system;
forming altered access information to modify the behavior of the security system during the staging;
testing the behavior of the security system during the staging by operating the security system in accordance with the altered access information; and
deploying the altered access information so as to synchronize the active access information stored in the database with the altered access information.
4 Assignments
0 Petitions
Accused Products
Abstract
An improved system and method for providing a security system with the capability to stage a modification to its operation is disclosed. Staging the modification before actually modifying normal operation of the security system allows the impact of the modification on the security system to be examined prior to deployment. If the staging of the modification to the security system is deemed successful, the modification can be fully deployed with reduced risk of unexpected security lapses or other detrimental consequences.
-
Citations
30 Claims
-
1. A method comprising:
-
forming access information for staging with respect to a security system, wherein the security system operates to restrict access to secured electronic data based on access information, wherein the access information includes or references one or more of access rules or access policies including at least when and where the secured electronic data can be accessed by a plurality of users, wherein the access information is based on active access information currently in use by the security system, and wherein the active access information and the access information is stored in a database operatively connected to the security system; forming altered access information to modify the behavior of the security system during the staging; testing the behavior of the security system during the staging by operating the security system in accordance with the altered access information; and deploying the altered access information so as to synchronize the active access information stored in the database with the altered access information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
initializing a staging server with initial access limitations derived from active access limitations, wherein a security system operates to restrict access to secured electronic data based on the access limitations, the access limitations including at least when and where the secured electronic data can be accessed by one or more user groups, and wherein the active access limitations are stored in a database operatively connected to the security system; modifying the initial access limitations to provide a staged environment; verifying operation of the security system in the staged environment while utilizing the modified access limitations; and deploying the staged environment as an active environment of the security system so as to synchronize the active access limitations stored in the database with the modified access limitations. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
an active server configured to enforce access limitations regarding secured electronic documents in accordance with organizational information of an entity and active document access information, wherein the active document access information includes or references one or more of access rules or access policies including at least when and where the secured electronic documents can be accessed by one or more user groups; a staging server configured to test access limitations imposed on the secured electronic documents in accordance with the organizational information of the entity and document access information, wherein the document access information includes or references one or more of access rules or access policies including at least when and where the secured electronic documents can be accessed by the one or more user groups; and a database stored in a computer readable storage medium, wherein the database is operatively connected to the active server and the staging server, wherein the database includes at least the organizational information of the entity synchronized for use by both the active server and the staging server, the active document access information for use by the active server, and the document access information for use by the staging server. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory computer readable storage medium having instructions stored thereon, the instructions comprising:
-
instructions to form access information for staging with respect to a security system, wherein the security system operates to restrict access to secured electronic data based on access information, and wherein the access information is based on active access information in use by the security system, wherein the access information includes or references one or more of access rules or access policies including at least when and where the secured electronic data can be accessed by a plurality of users, and wherein the active access information is stored in a database operatively connected to the security system; instructions to alter the access information to modify the behavior of the security system during the staging; and instructions to deploy the altered access information so as to synchronize the active access information stored in the database with the altered access information. - View Dependent Claims (26, 27)
-
-
28. A non-transitory computer readable storage medium having instructions stored thereon, the instructions comprising:
-
initializing a staging server with initial access limitations derived from active access limitations, wherein a security system operates to restrict access to secured electronic data based on the access limitations, wherein the access limitations include or reference one or more of access rules or access policies including at least when and where the secured electronic data can be accessed by one or more users or user groups, and wherein the active access limitations are stored in a database operatively connected to the security system; instructions for modifying the initial access limitations to provide a staged environment; instructions for verifying operation of the security system in the staged environment while utilizing the modified access limitations; and instructions for deploying-the staged environment as an active environment of the security system so as to synchronize the active access limitations stored in the database with the modified access limitations. - View Dependent Claims (29)
-
-
30. A non-transitory computer readable storage medium having instructions stored thereon, the instructions comprising:
-
instructions to obtain access information for staging with respect to a security system, wherein the security system operates to restrict access to secured electronic data based on access information, and wherein the access information includes or references one or more of access rules or access policies including at least when and where the secured electronic data can be accessed by a plurality of users, and wherein the active access is stored in a database operatively connected to the security system; testing the behavior of the security system during the staging by operating the security system in accordance with the access information; instructions to alter the access information to modify the behavior of the security system during the staging; and instructions to deploy the access information to be used as the access information for normal operational use of the security system in restricting access to the secured electronic data so as to synchronize the active access information stored in the database with the altered access information.
-
Specification