×

Method for controlling access to informational objects

  • US 8,645,422 B2
  • Filed: 08/12/2003
  • Issued: 02/04/2014
  • Est. Priority Date: 08/12/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for controlling access to informational objects in a database system comprising:

  • allowing, by a processor, each user of a plurality of users to designate, in a memory device, relationship characteristics between that user and any other user, wherein the relationship characteristics include at least one condition such that the relationship characteristics are valid only if the at least one condition is met;

    identifying, in the memory device, one of the plurality of users as an owner of a data object;

    determining, by the processor, electronic access to the data object by determining if the relationship characteristics on a first path between a first user of the plurality of users and the owner of the data object include a trusted relationship between each sequential pair of the users on the first path, wherein the first path comprises a first intermediate user beside said owner of the data object and the first user of the plurality of users;

    allowing, by the processor, the first user electronic access to the data object based on a trusted relationship designated by the first intermediary user and a trusted relationship designated by the owner, wherein one of the relationship characteristics designated by the owner includes the trusted relationship with the first intermediary user of the plurality of users, wherein one of the relationship characteristics designated by the first intermediary user includes the trusted relationship with the first user of the plurality of users;

    determining, by the processor, electronic access to the data object by determining if the relationship characteristics on a second path between a second user of the plurality of users and the owner of the computer data object include a trusted relationship or a distrusted relationship between each sequential pair of the users on that path, wherein the second path comprises a second intermediate user beside said owner of the data object and the second user of the plurality of users;

    allowing, by the processor, the second user electronic access to the data object based on the trusted relationship designated by the second intermediary user and the terminal distrusted relationship designated by the owner, wherein one of the relationship characteristics designated by the owner includes a terminal distrusted relationship with the second intermediary user of the plurality of users, wherein one of the relationship characteristics designated by the second intermediary user includes a trusted relationship with the second user of the plurality of users;

    determining, by the processor, electronic access to the data object by determining if the relationship characteristics on a third path between a third user of the plurality of users and the owner of the data object include a trusted relationship or a distrusted relationship between each sequential pair of the users on that path, wherein the third path comprises a third intermediate user beside said owner of the data object and the user of the plurality of users; and

    defining, by the processor, one of the relationship characteristics designated by the owner includes an intermediary distrusted relationship with the third intermediary user of the plurality of users, wherein one of the relationship characteristics designated by the third intermediary user includes a trusted relationship with the third user of the plurality of users, wherein the third user of the plurality of users is prohibited from electronic access to the data object based on the distrusted relationship designated by the owner.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×