Data access control
First Claim
1. A method comprising:
- receiving, by a computer processor of a computing system from a requestor, a request for access to specified data;
extracting, by said computer processor from said request, a requestor identification string associated with said requestor;
first verifying, by said computer processor, a match for said requestor identification string against a requestor registry;
retrieving, by said computer processor, a service requestor identification string associated with a service requesting said specified data;
second verifying, by said computer processor, a match for said service requestor identification string against a service registry;
retrieving, by said computer processor, a requestor software component operating process identification string associated with a requestor software component requesting said specified data;
third verifying, by said computer processor, a match for said requestor software component operating process identification string against a process registry;
retrieving, by said computer processor, a requestor server identification string associated with a requestor server requesting said specified data;
fourth verifying, by said computer processor, a match for said requestor server identification string against a server registry;
retrieving, by said computer processor, a requestor hardware device network address and a requestor media access control (MAC) address associated with a requestor hardware device requesting said specified data;
fifth verifying, by said computer processor, a match for said requestor hardware device network address and said requestor MAC address against a network registry;
retrieving, by said computer processor, a requestor hardware device identification string associated with said requestor hardware device requesting said specified data;
sixth verifying, by said computer processor, a match for said requestor hardware device identification string against a device registry;
extracting, by said computer processor from said request, a provider identification string associated with a provider of said specified data;
seventh verifying, by said computer processor, a match for said provider identification string against a provider registry;
retrieving, by said computer processor, a service provider identification string associated with a service providing said specified data;
eighth verifying, by said computer processor, a match for said service provider identification string against said service registry;
retrieving, by said computer processor, a provider software component operating process identification string associated with a provider software component providing said specified data;
ninth verifying, by said computer processor, a match for said provider software component operating process identification string against said process registry;
retrieving, by said computer processor, a provider server identification string associated with a provider server providing said specified data;
tenth verifying, by said computer processor, a match for said provider server identification string against said server registry;
retrieving, by said computer processor, a provider hardware device identification string associated with said provider hardware device providing said specified data; and
eleventh verifying, by said computer processor, a match for said provider hardware device identification string against said device registry;
generating, by said computer processor, an access point door associated with a specified logical storage room representation, said logical storage room representation comprising a storage space comprised by a plurality of different storage mediums and physical storage locations, said logical storage room representation comprising said specified data;
cross-referencing, by said computer processor, verification results of said first verifying, said second verifying, said third verifying, said fourth verifying, said fifth verifying, said sixth verifying, said seventh verifying, said eighth verifying, said ninth verifying, said tenth verifying, and said eleventh verifying;
generating, by said computer processor, a scorecard comprising results of said cross-referencing, wherein said scorecard comprises;
a Score_Card ID entry comprising a unique record for each scorecard record;
a Scorecard_Results entry providing a tabulated value of the scorecard and determining pass or failure of a combined verification test; and
a plurality of verification results entries comprising said verification results;
determining, by said computer processor, that said scorecard comprises a valid integration pattern;
generating, by said computer processor based on said valid integration pattern, a logical key associated with said access point door;
generating, by said computer processor based on said valid integration pattern, a logical lock associated with said logical key;
enabling, by said computer processor, said logical lock with said logical key;
determining, by said computer processor based, that a time stamp associated with said logical lock and said logical key is valid;
enabling, by said computer processor based on said scorecard comprising said results of said cross-referencing, said valid integration pattern, said enabling said logical lock with said logical key, and said time stamp being valid, access to said specified data via said access point door and said specified logical storage room representation; and
disabling, by said computer processor, said logical lock using said logical key.
1 Assignment
0 Petitions
Accused Products
Abstract
A data access control method and system. The method includes receiving by a computer processor from a requestor, a request for access to data. The computer processor extracts from the request, a requestor identification string associated with the requestor. The computer processor verifies a match for the requestor identification string, a service requestor identification string, a requestor software component operating process identification string, a requestor server identification string, a requestor hardware device network address and a requestor MAC address, and a requestor hardware device identification string against a plurality of registries. The computer processor generates an access point door associated with a specified logical storage room representation comprising the data. The computer processor enables access to the data via the access point door and the specified logical storage room representation based on enabling a logical lock with a logical key and a valid timestamp.
-
Citations
18 Claims
-
1. A method comprising:
-
receiving, by a computer processor of a computing system from a requestor, a request for access to specified data; extracting, by said computer processor from said request, a requestor identification string associated with said requestor; first verifying, by said computer processor, a match for said requestor identification string against a requestor registry; retrieving, by said computer processor, a service requestor identification string associated with a service requesting said specified data; second verifying, by said computer processor, a match for said service requestor identification string against a service registry; retrieving, by said computer processor, a requestor software component operating process identification string associated with a requestor software component requesting said specified data; third verifying, by said computer processor, a match for said requestor software component operating process identification string against a process registry; retrieving, by said computer processor, a requestor server identification string associated with a requestor server requesting said specified data; fourth verifying, by said computer processor, a match for said requestor server identification string against a server registry; retrieving, by said computer processor, a requestor hardware device network address and a requestor media access control (MAC) address associated with a requestor hardware device requesting said specified data; fifth verifying, by said computer processor, a match for said requestor hardware device network address and said requestor MAC address against a network registry; retrieving, by said computer processor, a requestor hardware device identification string associated with said requestor hardware device requesting said specified data; sixth verifying, by said computer processor, a match for said requestor hardware device identification string against a device registry; extracting, by said computer processor from said request, a provider identification string associated with a provider of said specified data; seventh verifying, by said computer processor, a match for said provider identification string against a provider registry; retrieving, by said computer processor, a service provider identification string associated with a service providing said specified data; eighth verifying, by said computer processor, a match for said service provider identification string against said service registry; retrieving, by said computer processor, a provider software component operating process identification string associated with a provider software component providing said specified data; ninth verifying, by said computer processor, a match for said provider software component operating process identification string against said process registry; retrieving, by said computer processor, a provider server identification string associated with a provider server providing said specified data; tenth verifying, by said computer processor, a match for said provider server identification string against said server registry; retrieving, by said computer processor, a provider hardware device identification string associated with said provider hardware device providing said specified data; and eleventh verifying, by said computer processor, a match for said provider hardware device identification string against said device registry; generating, by said computer processor, an access point door associated with a specified logical storage room representation, said logical storage room representation comprising a storage space comprised by a plurality of different storage mediums and physical storage locations, said logical storage room representation comprising said specified data; cross-referencing, by said computer processor, verification results of said first verifying, said second verifying, said third verifying, said fourth verifying, said fifth verifying, said sixth verifying, said seventh verifying, said eighth verifying, said ninth verifying, said tenth verifying, and said eleventh verifying; generating, by said computer processor, a scorecard comprising results of said cross-referencing, wherein said scorecard comprises;
a Score_Card ID entry comprising a unique record for each scorecard record;
a Scorecard_Results entry providing a tabulated value of the scorecard and determining pass or failure of a combined verification test; and
a plurality of verification results entries comprising said verification results;determining, by said computer processor, that said scorecard comprises a valid integration pattern; generating, by said computer processor based on said valid integration pattern, a logical key associated with said access point door; generating, by said computer processor based on said valid integration pattern, a logical lock associated with said logical key; enabling, by said computer processor, said logical lock with said logical key; determining, by said computer processor based, that a time stamp associated with said logical lock and said logical key is valid; enabling, by said computer processor based on said scorecard comprising said results of said cross-referencing, said valid integration pattern, said enabling said logical lock with said logical key, and said time stamp being valid, access to said specified data via said access point door and said specified logical storage room representation; and disabling, by said computer processor, said logical lock using said logical key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing system comprising a computer processor coupled to a computer-readable memory unit, said memory unit comprising instructions that when enabled by the computer processor implements a verification method comprising:
-
receiving, by said computer processor from a requestor, a request for access to specified data; extracting, by said computer processor from said request, a requestor identification string associated with said requestor; first verifying, by said computer processor, a match for said requestor identification string against a requestor registry; retrieving, by said computer processor, a service requestor identification string associated with a service requesting said specified data; second verifying, by said computer processor, a match for said service requestor identification string against a service registry; retrieving, by said computer processor, a requestor software component operating process identification string associated with a requestor software component requesting said specified data; third verifying, by said computer processor, a match for said requestor software component operating process identification string against a process registry; retrieving, by said computer processor, a requestor server identification string associated with a requestor server requesting said specified data; fourth verifying, by said computer processor, a match for said requestor server identification string against a server registry; retrieving, by said computer processor, a requestor hardware device network address and a requestor media access control (MAC) address associated with a requestor hardware device requesting said specified data; fifth verifying, by said computer processor, a match for said requestor hardware device network address and said requestor MAC address against a network registry; retrieving, by said computer processor, a requestor hardware device identification string associated with said requestor hardware device requesting said specified data; sixth verifying, by said computer processor, a match for said requestor hardware device identification string against a device registry; extracting, by said computer processor from said request, a provider identification string associated with a provider of said specified data; seventh verifying, by said computer processor, a match for said provider identification string against a provider registry; retrieving, by said computer processor, a service provider identification string associated with a service providing said specified data; eighth verifying, by said computer processor, a match for said service provider identification string against said service registry; retrieving, by said computer processor, a provider software component operating process identification string associated with a provider software component providing said specified data; ninth verifying, by said computer processor, a match for said provider software component operating process identification string against said process registry; retrieving, by said computer processor, a provider server identification string associated with a provider server providing said specified data; tenth verifying, by said computer processor, a match for said provider server identification string against said server registry; retrieving, by said computer processor, a provider hardware device identification string associated with said provider hardware device providing said specified data; and eleventh verifying, by said computer processor, a match for said provider hardware device identification string against said device registry; generating, by said computer processor, an access point door associated with a specified logical storage room representation, said logical storage room representation comprising a storage space comprised by a plurality of different storage mediums and physical storage locations, said logical storage room representation comprising said specified data; cross-referencing, by said computer processor, verification results of said first verifying, said second verifying, said third verifying, said fourth verifying, said fifth verifying, said sixth verifying, said seventh verifying, said eighth verifying, said ninth verifying, said tenth verifying, and said eleventh verifying; generating, by said computer processor, a scorecard comprising results of said cross-referencing, wherein said scorecard comprises;
a Score_Card ID entry comprising a unique record for each scorecard record;
a Scorecard_Results entry providing a tabulated value of the scorecard and determining pass or failure of a combined verification test; and
a plurality of verification results entries comprising said verification results;determining, by said computer processor, that said scorecard comprises a valid integration pattern; generating, by said computer processor based on said valid integration pattern, a logical key associated with said access point door; generating, by said computer processor based on said valid integration pattern, a logical lock associated with said logical key; enabling, by said computer processor, said logical lock with said logical key; determining, by said computer processor based, that a time stamp associated with said logical lock and said logical key is valid; enabling, by said computer processor based on said scorecard comprising said results of said cross-referencing, said valid integration pattern, said enabling said logical lock with said logical key, and said time stamp being valid, access to said specified data via said access point door and said specified logical storage room representation; and disabling, by said computer processor, said logical lock using said logical key. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method comprising:
-
defining, by a computer processor of a computing system, a requestor identification string associated with a requestor of data; adding, by said computer processor, said requestor identification string to a requestor registry; generating, by said computer processor, a requester verification component configured to enable a verification process that authenticates a service requester identification string match within a service request and defined with said requester registry, wherein said requester verification component comprises a requester table listing all registered requesters for services, and wherein said requester table comprises a Requester ID entry comprising a unique record for each requester record and a Requester Description entry describing each said requester; defining, by said computer processor, a provider identification string associated with a provider of said data; adding, by said computer processor, said provider identification string to a provider registry; generating, by said computer processor, a provider verification component configured to enable a verification process authenticating service provider identification within a service request and defined with said provider registry, wherein said provider verification component comprises a provider table listing all registered providers of services, wherein the provider table comprises a Provider ID entry comprising a unique record for each provider record and a Provider Description entry describing each said provider; defining, by said computer processor, a service identification string associated with said services associated with said data; adding, by said computer processor, said service identification string to a security registry; generating, by said computer processor, a service verification component configured to enable a verification process that authenticates said services comprising an internal application interface to a function, wherein said service verification component comprises a service table comprising service records; generating, by said computer processor, a security data model comprising said requester verification component, said provider verification component, and said service verification component; deploying, by said computer processor, said services to a server platform; adding, by said computer processor, results of said deploying to a server registry; executing, by said computer processor, said security data model, wherein said executing said security data model results in; generating, by said computer processor, an access point door associated with a specified logical storage room representation, said logical storage room representation comprising a storage space comprised by a plurality of different storage mediums and physical storage locations, said logical storage room representation comprising said data; cross-referencing, by said computer processor, verification results of;
verifying a match for said requestor identification string against said requestor registry;
verifying a match for said service requestor identification string against said service registry;
verifying a match for a requestor software component operating process identification string against a process registry;
verifying a match for a requestor server identification string against said server registry;
verifying a match for a requestor hardware device network address and a requestor MAC address against a network registry;
verifying a match for a requestor hardware device identification string against a device registry;
verifying a match for said provider identification string against said provider registry;
verifying a match for a service provider identification string against said service registry;
verifying a match for a provider software component operating process identification string against said process registry;
verifying a match for a provider server identification string against said server registry;
verifying a match for a provider hardware device identification string against said device registry;generating, by said computer processor, a scorecard comprising results of said cross-referencing, wherein said scorecard comprises;
a Score Card ID entry comprising a unique record for each scorecard record of scorecard records;
a Scorecard Results entry providing a tabulated value of the scorecard and determining pass or failure of a combined verification test; and
a plurality of verification results entries comprising said verification results;determining, by said computer processor, that said scorecard comprises a valid integration pattern; generating, by said computer processor based on said valid integration pattern, a logical key associated with said access point door; generating, by said computer processor based on said valid integration pattern, a logical lock associated with said logical key; enabling, by said computer processor, said logical lock with said logical key; determining, by said computer processor based, that a time stamp associated with said logical lock and said logical key is valid; and enabling, by said computer processor based on said scorecard comprising said results of said cross-referencing, said valid integration pattern, said enabling said logical lock with said logical key, and said time stamp being valid, access to said data via said access point door and said specified logical storage room representation; and disabling, by said computer processor, said logical lock using said logical key. - View Dependent Claims (15, 16, 17, 18)
-
Specification