Control and enforcement of access of user data
First Claim
1. A computer-implemented method comprising:
- receiving, via an access manager at one or more computing devices, a request from one of a plurality of third-party applications to access data associated with a user;
determining, using the one or more computing devices, that a first service profile and a second service profile are associated with the user, wherein the first service profile includes at least one data service specified by the user and controls access of the third party application to the data associated with the user, based on a user-defined categorization of the data into one or more groups for the at least one data service and a user-defined association of the first service profile with the third-party application, and the second service profile includes at least another data service specified by the user;
identifying, via at least one of the access manager and an access information manager at the one or more computing devices, that the first service profile is associated, by the user, with at least the third-party application;
determining, via the access manager at the one or more computing devices, whether the data requested by the third-party application is provided by the at least one data service included in the first service profile, based on the user-defined categorization and the user-defined association of the first service profile, as identified by the access manager or the access information manager;
performing, via the access manager at the one or more computing devices, an action with respect to an access by the third-party application to the data, based on a result of the determining; and
providing, by the one or more computing devices, a user interface that displays an identity of the third-party applications and an indication of whether each of the third-party applications are associated with each of the first service profile and the second service profile, wherein the user interface provides a first option for the user to associate or disassociate the third-party applications with respect to the first service profile or the second service profile, and a second option for the user to define a boundary of a data stream to limit the access by the third party applications associated with the first service profile or the second service profile to the data, based on a type of the access or a degree of the access.
2 Assignments
0 Petitions
Accused Products
Abstract
Control and enforcement of access of user data are described, including receiving a request from an application to access data associated with a user; determining that a service profile and another service profile are associated with the user, the service profile includes at least one data service specified by the user and the another service profile includes at least another data service specified by the user; identifying the service profile being associated, by the user, with at least the application; determining whether the data requested by the application are provided by the at least one data service included in the service profile; and performing an action with respect to access by the application to the data requested, based on a result of the determining.
27 Citations
21 Claims
-
1. A computer-implemented method comprising:
-
receiving, via an access manager at one or more computing devices, a request from one of a plurality of third-party applications to access data associated with a user; determining, using the one or more computing devices, that a first service profile and a second service profile are associated with the user, wherein the first service profile includes at least one data service specified by the user and controls access of the third party application to the data associated with the user, based on a user-defined categorization of the data into one or more groups for the at least one data service and a user-defined association of the first service profile with the third-party application, and the second service profile includes at least another data service specified by the user; identifying, via at least one of the access manager and an access information manager at the one or more computing devices, that the first service profile is associated, by the user, with at least the third-party application; determining, via the access manager at the one or more computing devices, whether the data requested by the third-party application is provided by the at least one data service included in the first service profile, based on the user-defined categorization and the user-defined association of the first service profile, as identified by the access manager or the access information manager; performing, via the access manager at the one or more computing devices, an action with respect to an access by the third-party application to the data, based on a result of the determining; and providing, by the one or more computing devices, a user interface that displays an identity of the third-party applications and an indication of whether each of the third-party applications are associated with each of the first service profile and the second service profile, wherein the user interface provides a first option for the user to associate or disassociate the third-party applications with respect to the first service profile or the second service profile, and a second option for the user to define a boundary of a data stream to limit the access by the third party applications associated with the first service profile or the second service profile to the data, based on a type of the access or a degree of the access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving, via an access manager at one or more computing devices, a request from a third-party application to access data associated with a user; determining, using the one or more computing devices, that a service profile and second service profile are associated with the user, wherein the first service profile includes at least one data service specified by the user and controls access of the third party application to the data associated with the user, based on a user-defined categorization of the data into one or more groups for the at least one data service and a user-defined association of the first service profile with the third-party application, and the second service profile includes at least another data service specified by the user; identifying, via at least one of the access manager and an access information manager at the one or more computing devices, that the first service profile has been associated, by the user, with at least the third-party application; determining, via the access manager at the one or more computing devices, whether the data requested by the third-party application is provided by the at least one data service included in the first service profile, based on the user-defined categorization and the user-defined association of the first service profile, as identified by the access manager or the access information manager; performing, via the access manager at the one or more computing devices, an action with respect to an access by the third-party application to the data, based on a result of the determining; and providing, by the one or more computing devices, a user interface that displays an identity of the third-party applications and an indication of whether each of the third-party applications are associated with each of the first service profile and the second service profile, wherein the user interface provides a first option for the user to associate or disassociate the third-party applications with respect to the first service profile or the second service profile, and a second option for the user to define a boundary of a data stream to limit the access by the third party applications associated with the first service profile or the second service profile to the data, based on a type of the access or a degree of the access. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. At least one computing device comprising:
-
storage and at least one hardware processor configured to perform; receiving, via an access manager at the at least one computing device, a request from a third-party application to access data associated with a user; determining, using the at least one computing device, that a service profile and second service profile are associated with the user, wherein the first service profile includes at least one data service specified by the user and controls access of the third party application to the data associated with the user, based on a user-defined categorization of the data into one or more groups for the at least one data service and a user-defined association of the first service profile with the third-party application, and the second service profile includes at least another data service specified by the user; identifying, via at least one of the access manager and an access information manager at the at least one computing device, the first service profile has been associated, by the user, with at least the third-party application; determining, via the access manager at the at least one computing device, whether the data requested by the third-party application is provided by the at least one data service included in the first service profile, based on the user-defined categorization and the user-defined association of the first service profile, as identified by the access manager or the access information manager; performing, via the access manager at the at least one computing device, an action with respect to an access by the third-party application to the data, based on a result of the determining; and providing, by the one or more computing devices, a user interface that displays an identity of the third-party applications and an indication of whether each of the third-party applications are associated with each of the first service profile and the second service profile, wherein the user interface provides a first option for the user to associate or disassociate the third-party applications with respect to the first service profile or the second service profile, and a second option for the user to define a boundary of a data stream to limit the access by the third party applications associated with the first service profile or the second service profile to the data, based on a type of the access or a degree of the access. - View Dependent Claims (18, 19, 20, 21)
-
Specification