APPARATUS AND METHOD FOR ACCESS VALIDATION
First Claim
1. An apparatus configured for performing access validation, comprising:
- one or more processors;
an access validation application configured for;
receiving a request for performing access validation of a particular resource, wherein performing access validation comprises determining whether a previously granted access to said resource is valid;
determining whether the previously granted access to said resource is valid comprises invoking a workflow process that is dynamically generated at least in part from a structure of a hierarchy of resources and a location of the particular resource within the hierarchy, wherein the invoked workflow process comprises requesting access validation from a chain of one or more owners corresponding to sub-resources as defined by the structure of the hierarchy;
in response to determining whether the preciously granted access to said resource is valid, responding to the request for performing access validation of a particular resource with any of the following five options;
an affirmation of validity;
a negative indication that said previously granted access to said resource is not valid;
a stronger condition;
an answer indicating that it cannot be determined whether the previously granted access to said resource is valid; and
an exception, wherein it was determined that the previously granted access to the resource is not valid, however that temporary access to the resource is required;
wherein configuring said access validation application does not require business rules.
1 Assignment
0 Petitions
Accused Products
Abstract
One or more techniques for access validation are provided. Access validation may be performed automatically or in real-time. Access validation may be at the resource level or at a sub-resource level. Techniques provided herein may be applied in a large variety of situations and industries, e.g. compliance management or inventory. Access validation reports may be generated in real-time or may link to indications of access validation in real-time. Five outcomes or options are provided, including affirmative, negative, stronger negative with larger implication, undetermined, and negative, however with temporarily granted access. A field for allowing entry of justification for access to a particular resource is provided. Reminders to validate privileges are provided. A continuous access validation process is provided. A technique for extending the hierarchy and corresponding workflow that is generated thereof is provided.
-
Citations
20 Claims
-
1. An apparatus configured for performing access validation, comprising:
-
one or more processors; an access validation application configured for; receiving a request for performing access validation of a particular resource, wherein performing access validation comprises determining whether a previously granted access to said resource is valid; determining whether the previously granted access to said resource is valid comprises invoking a workflow process that is dynamically generated at least in part from a structure of a hierarchy of resources and a location of the particular resource within the hierarchy, wherein the invoked workflow process comprises requesting access validation from a chain of one or more owners corresponding to sub-resources as defined by the structure of the hierarchy; in response to determining whether the preciously granted access to said resource is valid, responding to the request for performing access validation of a particular resource with any of the following five options; an affirmation of validity; a negative indication that said previously granted access to said resource is not valid; a stronger condition; an answer indicating that it cannot be determined whether the previously granted access to said resource is valid; and an exception, wherein it was determined that the previously granted access to the resource is not valid, however that temporary access to the resource is required; wherein configuring said access validation application does not require business rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for performing access validation, comprising:
-
receiving a request for performing access validation of a particular resource, wherein performing access validation comprises determining whether a previously granted access to said resource is valid; determining whether the previously granted access to said resource is valid comprises invoking a workflow process that is dynamically generated at least in part from a structure of a hierarchy of resources and a location of the particular resource within the hierarchy, wherein the invoked workflow process comprises requesting access validation from a chain of one or more owners corresponding to sub-resources as defined by the structure of the hierarchy; in response to determining whether the preciously granted access to said resource is valid, responding to the request for performing access validation of a particular resource with any of the following five options; an affirmation of validity; a negative indication that said previously granted access to said resource is not valid; a stronger condition; an answer indicating that it cannot be determined whether the previously granted access to said resource is valid; and an exception, wherein it was determined that the previously granted access to the resource is not valid, however that temporary access to the resource is required; wherein business rules are not required; and wherein said method is performed by a computer system configured to perform said method. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification