SCENARIO-BASED ACCESS CONTROL

Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an author...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: CULLEY Carrie, GARG Alka, TODD Michael, MASILAMANI John Kingsly, ZHENG Can, ALAM Ali, PULLIKOTTIL Jack, BODEGAS MARTINEZ Gerardo, HOLCOMB Amanda, JING Jing, GAO Zhuang, GYARMATHY James Paul Jr, KOHLI Hardeep, BALASUBRAMANIAN Ayyappan, KAMATH Rohan, VANKAMAMIDI Sandhya, SINGHAL Mansi
Format: Patent
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator CULLEY Carrie
GARG Alka
TODD Michael
MASILAMANI John Kingsly
ZHENG Can
ALAM Ali
PULLIKOTTIL Jack
BODEGAS MARTINEZ Gerardo
HOLCOMB Amanda
JING Jing
GAO Zhuang
GYARMATHY James Paul Jr
KOHLI Hardeep
BALASUBRAMANIAN Ayyappan
KAMATH Rohan
VANKAMAMIDI Sandhya
SINGHAL Mansi
description Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_LU102215B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>LU102215B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_LU102215B13</originalsourceid><addsrcrecordid>eNrjZJANdnb1cwzy9Nd1cgx2dVFwdHZ2DQ5WcPb3Cwny9-FhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfE-oYYGRkaGpk6GxoRVAAALXiAt</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SCENARIO-BASED ACCESS CONTROL</title><source>esp@cenet</source><creator>CULLEY Carrie ; GARG Alka ; TODD Michael ; MASILAMANI John Kingsly ; ZHENG Can ; ALAM Ali ; PULLIKOTTIL Jack ; BODEGAS MARTINEZ Gerardo ; HOLCOMB Amanda ; JING Jing ; GAO Zhuang ; GYARMATHY James Paul Jr ; KOHLI Hardeep ; BALASUBRAMANIAN Ayyappan ; KAMATH Rohan ; VANKAMAMIDI Sandhya ; SINGHAL Mansi</creator><creatorcontrib>CULLEY Carrie ; GARG Alka ; TODD Michael ; MASILAMANI John Kingsly ; ZHENG Can ; ALAM Ali ; PULLIKOTTIL Jack ; BODEGAS MARTINEZ Gerardo ; HOLCOMB Amanda ; JING Jing ; GAO Zhuang ; GYARMATHY James Paul Jr ; KOHLI Hardeep ; BALASUBRAMANIAN Ayyappan ; KAMATH Rohan ; VANKAMAMIDI Sandhya ; SINGHAL Mansi</creatorcontrib><description>Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.</description><language>eng</language><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220525&amp;DB=EPODOC&amp;CC=LU&amp;NR=102215B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220525&amp;DB=EPODOC&amp;CC=LU&amp;NR=102215B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>CULLEY Carrie</creatorcontrib><creatorcontrib>GARG Alka</creatorcontrib><creatorcontrib>TODD Michael</creatorcontrib><creatorcontrib>MASILAMANI John Kingsly</creatorcontrib><creatorcontrib>ZHENG Can</creatorcontrib><creatorcontrib>ALAM Ali</creatorcontrib><creatorcontrib>PULLIKOTTIL Jack</creatorcontrib><creatorcontrib>BODEGAS MARTINEZ Gerardo</creatorcontrib><creatorcontrib>HOLCOMB Amanda</creatorcontrib><creatorcontrib>JING Jing</creatorcontrib><creatorcontrib>GAO Zhuang</creatorcontrib><creatorcontrib>GYARMATHY James Paul Jr</creatorcontrib><creatorcontrib>KOHLI Hardeep</creatorcontrib><creatorcontrib>BALASUBRAMANIAN Ayyappan</creatorcontrib><creatorcontrib>KAMATH Rohan</creatorcontrib><creatorcontrib>VANKAMAMIDI Sandhya</creatorcontrib><creatorcontrib>SINGHAL Mansi</creatorcontrib><title>SCENARIO-BASED ACCESS CONTROL</title><description>Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.</description><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJANdnb1cwzy9Nd1cgx2dVFwdHZ2DQ5WcPb3Cwny9-FhYE1LzClO5YXS3Azybq4hzh66qQX58anFBYnJqXmpJfE-oYYGRkaGpk6GxoRVAAALXiAt</recordid><startdate>20220525</startdate><enddate>20220525</enddate><creator>CULLEY Carrie</creator><creator>GARG Alka</creator><creator>TODD Michael</creator><creator>MASILAMANI John Kingsly</creator><creator>ZHENG Can</creator><creator>ALAM Ali</creator><creator>PULLIKOTTIL Jack</creator><creator>BODEGAS MARTINEZ Gerardo</creator><creator>HOLCOMB Amanda</creator><creator>JING Jing</creator><creator>GAO Zhuang</creator><creator>GYARMATHY James Paul Jr</creator><creator>KOHLI Hardeep</creator><creator>BALASUBRAMANIAN Ayyappan</creator><creator>KAMATH Rohan</creator><creator>VANKAMAMIDI Sandhya</creator><creator>SINGHAL Mansi</creator><scope>EVB</scope></search><sort><creationdate>20220525</creationdate><title>SCENARIO-BASED ACCESS CONTROL</title><author>CULLEY Carrie ; GARG Alka ; TODD Michael ; MASILAMANI John Kingsly ; ZHENG Can ; ALAM Ali ; PULLIKOTTIL Jack ; BODEGAS MARTINEZ Gerardo ; HOLCOMB Amanda ; JING Jing ; GAO Zhuang ; GYARMATHY James Paul Jr ; KOHLI Hardeep ; BALASUBRAMANIAN Ayyappan ; KAMATH Rohan ; VANKAMAMIDI Sandhya ; SINGHAL Mansi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_LU102215B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><toplevel>online_resources</toplevel><creatorcontrib>CULLEY Carrie</creatorcontrib><creatorcontrib>GARG Alka</creatorcontrib><creatorcontrib>TODD Michael</creatorcontrib><creatorcontrib>MASILAMANI John Kingsly</creatorcontrib><creatorcontrib>ZHENG Can</creatorcontrib><creatorcontrib>ALAM Ali</creatorcontrib><creatorcontrib>PULLIKOTTIL Jack</creatorcontrib><creatorcontrib>BODEGAS MARTINEZ Gerardo</creatorcontrib><creatorcontrib>HOLCOMB Amanda</creatorcontrib><creatorcontrib>JING Jing</creatorcontrib><creatorcontrib>GAO Zhuang</creatorcontrib><creatorcontrib>GYARMATHY James Paul Jr</creatorcontrib><creatorcontrib>KOHLI Hardeep</creatorcontrib><creatorcontrib>BALASUBRAMANIAN Ayyappan</creatorcontrib><creatorcontrib>KAMATH Rohan</creatorcontrib><creatorcontrib>VANKAMAMIDI Sandhya</creatorcontrib><creatorcontrib>SINGHAL Mansi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>CULLEY Carrie</au><au>GARG Alka</au><au>TODD Michael</au><au>MASILAMANI John Kingsly</au><au>ZHENG Can</au><au>ALAM Ali</au><au>PULLIKOTTIL Jack</au><au>BODEGAS MARTINEZ Gerardo</au><au>HOLCOMB Amanda</au><au>JING Jing</au><au>GAO Zhuang</au><au>GYARMATHY James Paul Jr</au><au>KOHLI Hardeep</au><au>BALASUBRAMANIAN Ayyappan</au><au>KAMATH Rohan</au><au>VANKAMAMIDI Sandhya</au><au>SINGHAL Mansi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SCENARIO-BASED ACCESS CONTROL</title><date>2022-05-25</date><risdate>2022</risdate><abstract>Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_LU102215B1
source esp@cenet
title SCENARIO-BASED ACCESS CONTROL
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T02%3A18%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=CULLEY%20Carrie&rft.date=2022-05-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ELU102215B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true