Authorization path secured electronic storage system
First Claim
1. A computer implemented process for secure electronic storage comprising:
- authenticating a user to provide the user with access to a user account including at least one information resource that comprises an Authorization including(a) a reference to a secure memory block,(b) an access permission,(c) an identifier (ID),(d) a termination flag, and(e) an embedded authorization path comprising an ordered list of authorization IDs;
receiving a request including an authorization path to access a target secure memory block; and
determining if the Authorization allows for valid access to the target secure memory block.
0 Assignments
0 Petitions
Accused Products
Abstract
A secure electronic storage system includes an authentication gateway, a user/system interface coupled to the authentication gateway, a secure digital storage including a plurality of memory blocks (Containers) that store at least one information resource (Fact), wherein a target Container can only be accessed by a Fact comprising a valid authorization path (Authorization), and a memory controller coupling the user/system interface to the secure digital storage. In a non-limiting example embodiment, the memory controller is operative to: (a) manage the creation, sharing and unsharing of Containers; and (b) determine if a request to access a target Container includes a valid Authorization for that Container.
13 Citations
8 Claims
-
1. A computer implemented process for secure electronic storage comprising:
-
authenticating a user to provide the user with access to a user account including at least one information resource that comprises an Authorization including (a) a reference to a secure memory block, (b) an access permission, (c) an identifier (ID), (d) a termination flag, and (e) an embedded authorization path comprising an ordered list of authorization IDs; receiving a request including an authorization path to access a target secure memory block; and determining if the Authorization allows for valid access to the target secure memory block. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable medium including code segments implementing a process for secure electronic storage comprising:
-
code segments authenticating a user to provide the user with access to a user account including at least one information resource that comprises an Authorization data structure including (a) a reference to a secure memory block, (b) an access permission, (c) an identifier (ID), (d) a termination flag, and (e) an embedded authorization path comprising an ordered list of authorization IDs; code segments receiving a request including an authorization path to access a target secure memory block; and code segments determining if the Authorization allows for valid access to the target secure memory block. - View Dependent Claims (6, 7, 8)
-
Specification