Context-based security screening for accessing data
First Claim
1. A processor-implemented method for securely accessing a specific data store, the processor-implemented method comprising:
- associating, by a security module having a processor, a first non-contextual data object with a first context object to define a first synthetic context-based object, wherein the first non-contextual data object describes multiple types of persons, and wherein the first context object provides a context that identifies a specific type of person from the multiple types of persons;
associating, by the security module, the first synthetic context-based object with at least one specific data store in a data structure;
receiving, by the security module, a string of binary data that describes a requester of data from said at least one specific data store in the data structure;
determining, by the security module, the context according to a physical location of a computer being used, by the requester, to send the request to the security module;
generating, by the security module, a new synthetic context-based object for the requester;
determining, by the security module, whether the new synthetic context-based object matches the first synthetic context-based object;
in response to determining that the new synthetic context-based object matches the first synthetic context-based object, the security module locating, via the first synthetic context-based object, said at least one specific data store;
providing, by the security module, the requester access to said at least one specific data store;
constructing, by the security module, a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects, wherein synthetic context-based objects within a same dimension of the dimensionally constrained hierarchical synthetic context-based object library share data from a same non-contextual data object, and wherein synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library contain disparate data from different context objects;
receiving, from the requester, the request for data from at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library; and
returning, to the requester, data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library.
1 Assignment
0 Petitions
Accused Products
Abstract
A processor-implemented method, system, and/or computer program product securely accesses a specific data store. A non-contextual data object is associated with a context object to define a first synthetic context-based object. The non-contextual data object ambiguously describes multiple types of persons, and the context object provides a circumstantial context that identifies a specific type of person from the multiple types of persons. The first synthetic context-based object is associated with at least one specific data store in a data structure. A string of binary data that describes a requester of data is received by a security module for generating a new synthetic context-based object. If there is a match between the new synthetic context-based object and the first synthetic context-based object, then the data is returned to the requester.
158 Citations
16 Claims
-
1. A processor-implemented method for securely accessing a specific data store, the processor-implemented method comprising:
-
associating, by a security module having a processor, a first non-contextual data object with a first context object to define a first synthetic context-based object, wherein the first non-contextual data object describes multiple types of persons, and wherein the first context object provides a context that identifies a specific type of person from the multiple types of persons; associating, by the security module, the first synthetic context-based object with at least one specific data store in a data structure; receiving, by the security module, a string of binary data that describes a requester of data from said at least one specific data store in the data structure; determining, by the security module, the context according to a physical location of a computer being used, by the requester, to send the request to the security module; generating, by the security module, a new synthetic context-based object for the requester; determining, by the security module, whether the new synthetic context-based object matches the first synthetic context-based object; in response to determining that the new synthetic context-based object matches the first synthetic context-based object, the security module locating, via the first synthetic context-based object, said at least one specific data store; providing, by the security module, the requester access to said at least one specific data store; constructing, by the security module, a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects, wherein synthetic context-based objects within a same dimension of the dimensionally constrained hierarchical synthetic context-based object library share data from a same non-contextual data object, and wherein synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library contain disparate data from different context objects; receiving, from the requester, the request for data from at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library; and returning, to the requester, data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product for securing data stores, the computer program product comprising a non-transitory computer readable storage medium having program code embodied therewith, the program code readable and executable by a processor to perform a method comprising:
-
associating, by a security module having one or more processors, a first non-contextual data object with a first context object to define a first synthetic context-based object, wherein the first non-contextual data object describes multiple types of persons, and wherein the first context object provides a context that identifies a specific type of person from the multiple types of persons, wherein the context describes an activity performed by the specific type of person; associating, by the security module, the first synthetic context-based object with at least one specific data store in a data structure; receiving, by a security module, a string of binary data that describes a requester of data from said at least one specific data store in the data structure; generating, by the security module, a new synthetic context-based object for the requester; determining, by the security module, whether the new synthetic context-based object matches the first synthetic context-based object; in response to determining that the new synthetic context-based object matches the first synthetic context-based object, the security module locating, via the first synthetic context-based object, said at least one specific data store; and providing, by the security module, the requester access to said at least one specific data store; constructing a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects, wherein synthetic context-based objects within a same dimension of the dimensionally constrained hierarchical synthetic context-based object library share data from a same non-contextual data object, and wherein synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library contain disparate data from different context objects; receiving the request for data from at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library; and returning data from said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library. - View Dependent Claims (15)
-
-
16. A processor-implemented method for securely accessing a specific data store, the processor-implemented method comprising:
-
associating, by a security module having a processor, a first non-contextual data object with a first context object to define a first synthetic context-based object, wherein the first non-contextual data object relates to multiple subject-matters and describes multiple types of persons, wherein the first context object provides a context that identifies a specific type of person from the multiple types of persons, and associating, by the security module, the first synthetic context-based object with at least one specific data store in a data structure; receiving, by a security module, a string of binary data that describes a requester of data from said at least one specific data store in the data structure; generating, by the security module, a new synthetic context-based object for the requester; determining, by the security module, whether the new synthetic context-based object matches the first synthetic context-based object; in response to determining that the new synthetic context-based object matches the first synthetic context-based object, the security module locating, via the first synthetic context-based object, said at least one specific data store; providing, by the security module, the requester access to said at least one specific data store; constructing, by the processor, a dimensionally constrained hierarchical synthetic context-based object library for multiple synthetic context-based objects, wherein synthetic context-based objects within a same dimension of the dimensionally constrained hierarchical synthetic context-based object library share data from a same non-contextual data object, and wherein synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library contain disparate data from different context objects; receiving, from the requester, a request for at least one data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library; and returning, to the requester, said at least one specific data store that is associated with synthetic context-based objects within the same dimension of the dimensionally constrained hierarchical synthetic context-based object library.
-
Specification