×

Context-based security screening for accessing data

  • US 9,477,844 B2
  • Filed: 10/28/2014
  • Issued: 10/25/2016
  • Est. Priority Date: 11/19/2012
  • Status: Active Grant
First Claim
Patent Images

1. A processor-implemented method for securely accessing a specific data store, the processor-implemented method comprising:

  • associating, by a security module having a processor, a first non-contextual data object with a first context object to define a first synthetic context-based object, wherein the first non-contextual data object describes multiple types of persons, wherein the first context object provides a context that identifies a specific type of person from the multiple types of persons, and wherein the first context object further describes a location of a computer that is being used by a requester of data as being a public Wi-Fi hot spot that provides the computer with access to a network;

    associating, by the security module, the first synthetic context-based object with at least one specific data store in a data structure;

    receiving, by the security module, a string of binary data that describes a request, from the requester, for data from said at least one specific data store in the data structure;

    determining, by the security module, the context according to a physical location of a computer being used, by the requester, to send the request to the security module;

    generating, by the security module, a new synthetic context-based object for the requester;

    determining, by the security module, whether the new synthetic context-based object matches the first synthetic context-based object;

    in response to determining that the new synthetic context-based object matches the first synthetic context-based object, the security module locating, via the first synthetic context-based object, said at least one specific data store;

    providing, by the security module, the requester access to said at least one specific data store;

    constructing, by the security module, a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects, wherein synthetic context-based objects within a same dimension of the dimensionally constrained hierarchical synthetic context-based object library share data from a same non-contextual data object, and wherein synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library contain disparate data from different context objects;

    receiving, from the requester, the request for data from at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library;

    receiving, from the requester, a time window for receiving the data from said at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library, wherein the time window describes an amount of time that the requester of data is willing to wait for at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library;

    determining, by the security module, a security level of the requester based on the time window received from the requester, wherein a longer time window is indicative of a higher security level for the requester than a relatively shorter time window;

    matching, by the security module and based on the time window for the requester, the security level of the requester to data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library; and

    returning, to the requester, data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library and that matches the security level of the requester.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×