×

Method for managing data in a shared computing environment

  • US 8,352,999 B1
  • Filed: 07/21/2006
  • Issued: 01/08/2013
  • Est. Priority Date: 07/21/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method of storing, protecting, and accessing secret data in a shared computing environment, comprising:

  • defining, for a piece of secret data, a security zone for one or more entities with a common security characteristic, wherein the security zone defines a plurality of groups of users that can access the piece of secret data, wherein the piece of secret data is used to access the one or more entities defined by the security zone, and wherein at least two groups of users of the plurality of groups of users can access the piece of secret data using different access privileges, the different access privileges allowing the at least two groups of users to perform different functions on the piece of secret data;

    determining whether a request by a user to access the piece of secret data used to access the one or more entities defined by the security zone will be granted, whereinthe piece of secret data and one or more administration policies are centrally stored on a directory server,the one or more administration policies comprise one or more user authentication policies that are used to authenticate the requesting user on the directory server,the one or more administration policies further comprise the security zone, which defines the piece of secret data that is accessible by the requesting user;

    the one or more administration policies further comprise one or more authorization policies that control access to the piece of secret data defined by the security zone, in which the requesting user is permitted to access the piece of secret data used to access the one or more entities defined by the security zone, without going to an external computing node, upon satisfaction of the one or more authorization policies,distributing the piece of secret data to the requesting user without pushing the piece of secret data to the requesting user, whereinthe requesting user shares the piece of secret data in the shared computing environment, anddefining one or more additional security zones, each additional security zone determining or identifying;

    a group of users, and an additional piece of secret data that is accessible by the group of users.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×