SCENARIO-BASED ACCESS CONTROL
Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an author...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | CULLEY Carrie GARG Alka TODD Michael MASILAMANI John Kingsly ZHENG Can ALAM Ali PULLIKOTTIL Jack BODEGAS MARTINEZ Gerardo HOLCOMB Amanda JING Jing GAO Zhuang GYARMATHY James Paul Jr KOHLI Hardeep BALASUBRAMANIAN Ayyappan KAMATH Rohan VANKAMAMIDI Sandhya SINGHAL Mansi |
description | Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_LU102215B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>LU102215B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_LU102215B13</originalsourceid><addsrcrecordid>eNrjZJANdnb1cwzy9Nd1cgx2dVFwdHZ2DQ5WcPb3Cwny9-FhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfE-oYYGRkaGpk6GxoRVAAALXiAt</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SCENARIO-BASED ACCESS CONTROL</title><source>esp@cenet</source><creator>CULLEY Carrie ; GARG Alka ; TODD Michael ; MASILAMANI John Kingsly ; ZHENG Can ; ALAM Ali ; PULLIKOTTIL Jack ; BODEGAS MARTINEZ Gerardo ; HOLCOMB Amanda ; JING Jing ; GAO Zhuang ; GYARMATHY James Paul Jr ; KOHLI Hardeep ; BALASUBRAMANIAN Ayyappan ; KAMATH Rohan ; VANKAMAMIDI Sandhya ; SINGHAL Mansi</creator><creatorcontrib>CULLEY Carrie ; GARG Alka ; TODD Michael ; MASILAMANI John Kingsly ; ZHENG Can ; ALAM Ali ; PULLIKOTTIL Jack ; BODEGAS MARTINEZ Gerardo ; HOLCOMB Amanda ; JING Jing ; GAO Zhuang ; GYARMATHY James Paul Jr ; KOHLI Hardeep ; BALASUBRAMANIAN Ayyappan ; KAMATH Rohan ; VANKAMAMIDI Sandhya ; SINGHAL Mansi</creatorcontrib><description>Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.</description><language>eng</language><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220525&DB=EPODOC&CC=LU&NR=102215B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220525&DB=EPODOC&CC=LU&NR=102215B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CULLEY Carrie</creatorcontrib><creatorcontrib>GARG Alka</creatorcontrib><creatorcontrib>TODD Michael</creatorcontrib><creatorcontrib>MASILAMANI John Kingsly</creatorcontrib><creatorcontrib>ZHENG Can</creatorcontrib><creatorcontrib>ALAM Ali</creatorcontrib><creatorcontrib>PULLIKOTTIL Jack</creatorcontrib><creatorcontrib>BODEGAS MARTINEZ Gerardo</creatorcontrib><creatorcontrib>HOLCOMB Amanda</creatorcontrib><creatorcontrib>JING Jing</creatorcontrib><creatorcontrib>GAO Zhuang</creatorcontrib><creatorcontrib>GYARMATHY James Paul Jr</creatorcontrib><creatorcontrib>KOHLI Hardeep</creatorcontrib><creatorcontrib>BALASUBRAMANIAN Ayyappan</creatorcontrib><creatorcontrib>KAMATH Rohan</creatorcontrib><creatorcontrib>VANKAMAMIDI Sandhya</creatorcontrib><creatorcontrib>SINGHAL Mansi</creatorcontrib><title>SCENARIO-BASED ACCESS CONTROL</title><description>Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJANdnb1cwzy9Nd1cgx2dVFwdHZ2DQ5WcPb3Cwny9-FhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfE-oYYGRkaGpk6GxoRVAAALXiAt</recordid><startdate>20220525</startdate><enddate>20220525</enddate><creator>CULLEY Carrie</creator><creator>GARG Alka</creator><creator>TODD Michael</creator><creator>MASILAMANI John Kingsly</creator><creator>ZHENG Can</creator><creator>ALAM Ali</creator><creator>PULLIKOTTIL Jack</creator><creator>BODEGAS MARTINEZ Gerardo</creator><creator>HOLCOMB Amanda</creator><creator>JING Jing</creator><creator>GAO Zhuang</creator><creator>GYARMATHY James Paul Jr</creator><creator>KOHLI Hardeep</creator><creator>BALASUBRAMANIAN Ayyappan</creator><creator>KAMATH Rohan</creator><creator>VANKAMAMIDI Sandhya</creator><creator>SINGHAL Mansi</creator><scope>EVB</scope></search><sort><creationdate>20220525</creationdate><title>SCENARIO-BASED ACCESS CONTROL</title><author>CULLEY Carrie ; GARG Alka ; TODD Michael ; MASILAMANI John Kingsly ; ZHENG Can ; ALAM Ali ; PULLIKOTTIL Jack ; BODEGAS MARTINEZ Gerardo ; HOLCOMB Amanda ; JING Jing ; GAO Zhuang ; GYARMATHY James Paul Jr ; KOHLI Hardeep ; BALASUBRAMANIAN Ayyappan ; KAMATH Rohan ; VANKAMAMIDI Sandhya ; SINGHAL Mansi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_LU102215B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>online_resources</toplevel><creatorcontrib>CULLEY Carrie</creatorcontrib><creatorcontrib>GARG Alka</creatorcontrib><creatorcontrib>TODD Michael</creatorcontrib><creatorcontrib>MASILAMANI John Kingsly</creatorcontrib><creatorcontrib>ZHENG Can</creatorcontrib><creatorcontrib>ALAM Ali</creatorcontrib><creatorcontrib>PULLIKOTTIL Jack</creatorcontrib><creatorcontrib>BODEGAS MARTINEZ Gerardo</creatorcontrib><creatorcontrib>HOLCOMB Amanda</creatorcontrib><creatorcontrib>JING Jing</creatorcontrib><creatorcontrib>GAO Zhuang</creatorcontrib><creatorcontrib>GYARMATHY James Paul Jr</creatorcontrib><creatorcontrib>KOHLI Hardeep</creatorcontrib><creatorcontrib>BALASUBRAMANIAN Ayyappan</creatorcontrib><creatorcontrib>KAMATH Rohan</creatorcontrib><creatorcontrib>VANKAMAMIDI Sandhya</creatorcontrib><creatorcontrib>SINGHAL Mansi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CULLEY Carrie</au><au>GARG Alka</au><au>TODD Michael</au><au>MASILAMANI John Kingsly</au><au>ZHENG Can</au><au>ALAM Ali</au><au>PULLIKOTTIL Jack</au><au>BODEGAS MARTINEZ Gerardo</au><au>HOLCOMB Amanda</au><au>JING Jing</au><au>GAO Zhuang</au><au>GYARMATHY James Paul Jr</au><au>KOHLI Hardeep</au><au>BALASUBRAMANIAN Ayyappan</au><au>KAMATH Rohan</au><au>VANKAMAMIDI Sandhya</au><au>SINGHAL Mansi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SCENARIO-BASED ACCESS CONTROL</title><date>2022-05-25</date><risdate>2022</risdate><abstract>Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_LU102215B1 |
source | esp@cenet |
title | SCENARIO-BASED ACCESS CONTROL |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T02%3A18%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CULLEY%20Carrie&rft.date=2022-05-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ELU102215B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |