Providing access control for a destination in a messaging system
First Claim
1. A method for providing controlled access for a destination in a messaging system, said method comprising:
- determining one or more messages stored in the destination, wherein each message comprises one or more message properties;
receiving an access request for accessing the destination wherein the access request comprises a requestor identifier;
identifying a mapping table associated with the destination, wherein the mapping table comprises a set of requestor identifiers, each requestor identifier associated with a set of message selectors;
obtaining from the mapping table a given set of message selectors associated with the requestor identifier comprised in the access request;
comparing the message properties of each message stored in the destination with the given set of message selectors;
returning, as a response to said access request, any messages stored in the destination comprising the message properties matching the given set of message selectors; and
blocking access to any messages stored in the destination comprising message properties that fail to match the given set of message selectors.
3 Assignments
0 Petitions
Accused Products
Abstract
Providing controlled access for a destination in a messaging system includes: selecting a destination for storing messages in a messaging system, one or more of the messages comprising one or more message properties; associating each of a set of message requestors with a set of message selectors; and in response to an access request for the destination from a message requestor, determining the set of said message selectors associated with the message requestor and using the identified set of message selectors to check against messages on the destination comprising a corresponding set of message properties for providing a response to the access request.
11 Citations
10 Claims
-
1. A method for providing controlled access for a destination in a messaging system, said method comprising:
-
determining one or more messages stored in the destination, wherein each message comprises one or more message properties; receiving an access request for accessing the destination wherein the access request comprises a requestor identifier; identifying a mapping table associated with the destination, wherein the mapping table comprises a set of requestor identifiers, each requestor identifier associated with a set of message selectors; obtaining from the mapping table a given set of message selectors associated with the requestor identifier comprised in the access request; comparing the message properties of each message stored in the destination with the given set of message selectors; returning, as a response to said access request, any messages stored in the destination comprising the message properties matching the given set of message selectors; and blocking access to any messages stored in the destination comprising message properties that fail to match the given set of message selectors. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product comprising a non-transitory computer useable medium having a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
determine one or more messages stored in the destination, wherein each message comprises one or more message properties; receive an access request for accessing the destination, wherein the access request comprises a requestor identifier; identify a mapping table associated with the destination, wherein the mapping table comprises a set of requestor identifiers, each requestor identifier associated with a set of message selectors; obtain from the mapping table a given set of message selectors associated with the requestor identifier comprised in the access request; comparing the message properties of each message stored in the destination with the given set of message selectors; return, as a response to said access request, any messages stored in the destination comprising the message properties matching the given set of message selectors; and block access to any messages stored in the destination comprising message properties that fail to match the given set of message selectors. - View Dependent Claims (7, 8, 9, 10)
-
Specification