Policy scope management
The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions o...
Gespeichert in:
Hauptverfasser: | , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Watson, Alexander Bray, Tyler Stuart Cook, John Puchalski, Jeff Rungta, Neha Gough, Michael Luckow, Kasper Søe |
description | The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US11863563B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US11863563B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US11863563B13</originalsourceid><addsrcrecordid>eNrjZBAPyM_JTK5UKE7OL0hVyE3MS0xPzU3NK-FhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYaGFmbGpmbGTobGxKgBANB3Ihk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Policy scope management</title><source>esp@cenet</source><creator>Watson, Alexander ; Bray, Tyler Stuart ; Cook, John ; Puchalski, Jeff ; Rungta, Neha ; Gough, Michael ; Luckow, Kasper Søe</creator><creatorcontrib>Watson, Alexander ; Bray, Tyler Stuart ; Cook, John ; Puchalski, Jeff ; Rungta, Neha ; Gough, Michael ; Luckow, Kasper Søe</creatorcontrib><description>The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240102&DB=EPODOC&CC=US&NR=11863563B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240102&DB=EPODOC&CC=US&NR=11863563B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Watson, Alexander</creatorcontrib><creatorcontrib>Bray, Tyler Stuart</creatorcontrib><creatorcontrib>Cook, John</creatorcontrib><creatorcontrib>Puchalski, Jeff</creatorcontrib><creatorcontrib>Rungta, Neha</creatorcontrib><creatorcontrib>Gough, Michael</creatorcontrib><creatorcontrib>Luckow, Kasper Søe</creatorcontrib><title>Policy scope management</title><description>The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZBAPyM_JTK5UKE7OL0hVyE3MS0xPzU3NK-FhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYaGFmbGpmbGTobGxKgBANB3Ihk</recordid><startdate>20240102</startdate><enddate>20240102</enddate><creator>Watson, Alexander</creator><creator>Bray, Tyler Stuart</creator><creator>Cook, John</creator><creator>Puchalski, Jeff</creator><creator>Rungta, Neha</creator><creator>Gough, Michael</creator><creator>Luckow, Kasper Søe</creator><scope>EVB</scope></search><sort><creationdate>20240102</creationdate><title>Policy scope management</title><author>Watson, Alexander ; Bray, Tyler Stuart ; Cook, John ; Puchalski, Jeff ; Rungta, Neha ; Gough, Michael ; Luckow, Kasper Søe</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US11863563B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2024</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Watson, Alexander</creatorcontrib><creatorcontrib>Bray, Tyler Stuart</creatorcontrib><creatorcontrib>Cook, John</creatorcontrib><creatorcontrib>Puchalski, Jeff</creatorcontrib><creatorcontrib>Rungta, Neha</creatorcontrib><creatorcontrib>Gough, Michael</creatorcontrib><creatorcontrib>Luckow, Kasper Søe</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Watson, Alexander</au><au>Bray, Tyler Stuart</au><au>Cook, John</au><au>Puchalski, Jeff</au><au>Rungta, Neha</au><au>Gough, Michael</au><au>Luckow, Kasper Søe</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Policy scope management</title><date>2024-01-02</date><risdate>2024</risdate><abstract>The appropriate scoping of an access policy can be determined using the observed access and usage of various resources covered under that policy. Information about access requests received over a period of time can be logged, and actions represented in the log data can be mapped to the permissions of the access policy. A new access policy can be generated that includes grant permissions only for those actions that were received and/or granted during the monitored period of time. The new policy can be processed using policy logic to ensure that changes in permission comply with rules or policies for the target resources. The new policy can be at least partially implemented, or can be provided to an authorized user, who can choose to adopt or deny the new policy, or to accept some of the recommendations for modifying the current policy.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US11863563B1 |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Policy scope management |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T05%3A24%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Watson,%20Alexander&rft.date=2024-01-02&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS11863563B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |