×

Data driven role based security

  • US 9,537,863 B2
  • Filed: 08/11/2014
  • Issued: 01/03/2017
  • Est. Priority Date: 05/05/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for use at a computer system, the computer system including a processor and system memory, the method for controlling access to a computing object, the method comprising the processor:

  • obtaining a user context for a user identity during user input activity entered into the computer system through a running application;

    defining a derived role for the user identity relative to the computing object, the derived role defined from data context for accessing the computing object by the computer system on behalf of the user identity, the data context accessed based on the user context;

    accessing a control expression governing access to the computing object for the derived role;

    forming a set of permissions for the user identity in system memory by evaluating the control expression in the system memory based on the current version of the computing object and the data context; and

    determining the user identity'"'"'s access to the computing object in accordance with the set of permissions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×