×

Data access control

  • US 8,090,853 B2
  • Filed: 12/01/2009
  • Issued: 01/03/2012
  • Est. Priority Date: 12/01/2009
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • receiving, by a computer processor of a computing system from a requestor, a request for access to specified data;

    extracting, by said computer processor from said request, a requestor identification string associated with said requestor;

    first verifying, by said computer processor, a match for said requestor identification string against a requestor registry;

    retrieving, by said computer processor, a service requestor identification string associated with a service requesting said specified data;

    second verifying, by said computer processor, a match for said service requestor identification string against a service registry;

    retrieving, by said computer processor, a requestor software component operating process identification string associated with a requestor software component requesting said specified data;

    third verifying, by said computer processor, a match for said requestor software component operating process identification string against a process registry;

    retrieving, by said computer processor, a requestor server identification string associated with a requestor server requesting said specified data;

    fourth verifying, by said computer processor, a match for said requestor server identification string against a server registry;

    retrieving, by said computer processor, a requestor hardware device network address and a requestor media access control (MAC) address associated with a requestor hardware device requesting said specified data;

    fifth verifying, by said computer processor, a match for said requestor hardware device network address and said requestor MAC address against a network registry;

    retrieving, by said computer processor, a requestor hardware device identification string associated with said requestor hardware device requesting said specified data;

    sixth verifying, by said computer processor, a match for said requestor hardware device identification string against a device registry;

    extracting, by said computer processor from said request, a provider identification string associated with a provider of said specified data;

    seventh verifying, by said computer processor, a match for said provider identification string against a provider registry;

    retrieving, by said computer processor, a service provider identification string associated with a service providing said specified data;

    eighth verifying, by said computer processor, a match for said service provider identification string against said service registry;

    retrieving, by said computer processor, a provider software component operating process identification string associated with a provider software component providing said specified data;

    ninth verifying, by said computer processor, a match for said provider software component operating process identification string against said process registry;

    retrieving, by said computer processor, a provider server identification string associated with a provider server providing said specified data;

    tenth verifying, by said computer processor, a match for said provider server identification string against said server registry;

    retrieving, by said computer processor, a provider hardware device identification string associated with said provider hardware device providing said specified data; and

    eleventh verifying, by said computer processor, a match for said provider hardware device identification string against said device registry;

    generating, by said computer processor, an access point door associated with a specified logical storage room representation, said logical storage room representation comprising a storage space comprised by a plurality of different storage mediums and physical storage locations, said logical storage room representation comprising said specified data;

    cross-referencing, by said computer processor, verification results of said first verifying, said second verifying, said third verifying, said fourth verifying, said fifth verifying, said sixth verifying, said seventh verifying, said eighth verifying, said ninth verifying, said tenth verifying, and said eleventh verifying;

    generating, by said computer processor, a scorecard comprising results of said cross-referencing, wherein said scorecard comprises;

    a Score_Card ID entry comprising a unique record for each scorecard record;

    a Scorecard_Results entry providing a tabulated value of the scorecard and determining pass or failure of a combined verification test; and

    a plurality of verification results entries comprising said verification results;

    determining, by said computer processor, that said scorecard comprises a valid integration pattern;

    generating, by said computer processor based on said valid integration pattern, a logical key associated with said access point door;

    generating, by said computer processor based on said valid integration pattern, a logical lock associated with said logical key;

    enabling, by said computer processor, said logical lock with said logical key;

    determining, by said computer processor based, that a time stamp associated with said logical lock and said logical key is valid;

    enabling, by said computer processor based on said scorecard comprising said results of said cross-referencing, said valid integration pattern, said enabling said logical lock with said logical key, and said time stamp being valid, access to said specified data via said access point door and said specified logical storage room representation; and

    disabling, by said computer processor, said logical lock using said logical key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×