×

CONTEXT-BASED SECURITY SCREENING FOR ACCESSING DATA

  • US 20160335449A1
  • Filed: 07/29/2016
  • Published: 11/17/2016
  • Est. Priority Date: 11/19/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer system comprising:

  • one or more processors;

    one or more computer readable memories; and

    one or more non-transitory computer readable storage mediums, wherein program instructions are stored on at least one of the one or more non-transitory storage mediums for execution by at least one of the one or more processors via at least one of the one or more computer readable memories to perform a method comprising;

    associating a first non-contextual data object with a first context object to define a first synthetic context-based object, wherein the first non-contextual data object describes multiple types of persons, wherein the first context object provides a context that identifies a specific type of person from the multiple types of persons, and wherein the first context object further describes a location of a computer that is being used by a requester of data as being a public Wi-Fi hot spot that provides the computer with access to a network;

    associating the first synthetic context-based object with at least one specific data store in a data structure;

    receiving a string of binary data that describes a request, from the requester, for data from said at least one specific data store in the data structure;

    determining the context according to the physical location of the computer being used, by the requester, to send the request to a security module;

    generating a new synthetic context-based object for the requester;

    determining whether the new synthetic context-based object matches the first synthetic context-based object;

    in response to determining that the new synthetic context-based object matches the first synthetic context-based object, locating, via the first synthetic context-based object, said at least one specific data store;

    providing the requester access to said at least one specific data store;

    constructing a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects, wherein synthetic context-based objects within a same dimension of the dimensionally constrained hierarchical synthetic context-based object library share data from a same non-contextual data object, and wherein synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library contain disparate data from different context objects;

    receiving the request for data from at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library;

    receiving a time window for receiving the data from said at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library, wherein the time window describes an amount of time that the requester of data is willing to wait for at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library;

    determining a security level of the requester based on the time window received from the requester, wherein a longer time window is indicative of a higher security level for the requester than a relatively shorter time window;

    matching, based on the time window for the requester, the security level of the requester to data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library; and

    returning, to the requester, data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library and that matches the security level of the requester.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×