CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA
Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of...
Gespeichert in:
Hauptverfasser: | , , , , , , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | PUTTAGUNTA, Vasundhara SEHGAL, Richa MENON, Anand Madhava JINDAL, Himanshu MUSTAFI, Sanjoyan DANI, Rajalakshmi CHAUHAN, Sumit Kumar ROY, Shuvam Singha VAHIDNIA, Arash MAYOR, JR., Rufino Louie BOREDDY, Nikhil Reddy ARORA, Neha BAKER, Caleb Geoffrey ARORA, Himani |
description | Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2023401332A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2023401332A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2023401332A13</originalsourceid><addsrcrecordid>eNrjZDBw9vcLCfL38fH0c1dwDAjw8XR2DPH091NwdHZ2DQ5WCPFXCHb1C_YM8QxzVXBxDHHkYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkbGJgaGxsZGjobGxKkCANXRJzs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><source>esp@cenet</source><creator>PUTTAGUNTA, Vasundhara ; SEHGAL, Richa ; MENON, Anand Madhava ; JINDAL, Himanshu ; MUSTAFI, Sanjoyan ; DANI, Rajalakshmi ; CHAUHAN, Sumit Kumar ; ROY, Shuvam Singha ; VAHIDNIA, Arash ; MAYOR, JR., Rufino Louie ; BOREDDY, Nikhil Reddy ; ARORA, Neha ; BAKER, Caleb Geoffrey ; ARORA, Himani</creator><creatorcontrib>PUTTAGUNTA, Vasundhara ; SEHGAL, Richa ; MENON, Anand Madhava ; JINDAL, Himanshu ; MUSTAFI, Sanjoyan ; DANI, Rajalakshmi ; CHAUHAN, Sumit Kumar ; ROY, Shuvam Singha ; VAHIDNIA, Arash ; MAYOR, JR., Rufino Louie ; BOREDDY, Nikhil Reddy ; ARORA, Neha ; BAKER, Caleb Geoffrey ; ARORA, Himani</creatorcontrib><description>Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20231214&DB=EPODOC&CC=US&NR=2023401332A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20231214&DB=EPODOC&CC=US&NR=2023401332A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PUTTAGUNTA, Vasundhara</creatorcontrib><creatorcontrib>SEHGAL, Richa</creatorcontrib><creatorcontrib>MENON, Anand Madhava</creatorcontrib><creatorcontrib>JINDAL, Himanshu</creatorcontrib><creatorcontrib>MUSTAFI, Sanjoyan</creatorcontrib><creatorcontrib>DANI, Rajalakshmi</creatorcontrib><creatorcontrib>CHAUHAN, Sumit Kumar</creatorcontrib><creatorcontrib>ROY, Shuvam Singha</creatorcontrib><creatorcontrib>VAHIDNIA, Arash</creatorcontrib><creatorcontrib>MAYOR, JR., Rufino Louie</creatorcontrib><creatorcontrib>BOREDDY, Nikhil Reddy</creatorcontrib><creatorcontrib>ARORA, Neha</creatorcontrib><creatorcontrib>BAKER, Caleb Geoffrey</creatorcontrib><creatorcontrib>ARORA, Himani</creatorcontrib><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><description>Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDBw9vcLCfL38fH0c1dwDAjw8XR2DPH091NwdHZ2DQ5WCPFXCHb1C_YM8QxzVXBxDHHkYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkbGJgaGxsZGjobGxKkCANXRJzs</recordid><startdate>20231214</startdate><enddate>20231214</enddate><creator>PUTTAGUNTA, Vasundhara</creator><creator>SEHGAL, Richa</creator><creator>MENON, Anand Madhava</creator><creator>JINDAL, Himanshu</creator><creator>MUSTAFI, Sanjoyan</creator><creator>DANI, Rajalakshmi</creator><creator>CHAUHAN, Sumit Kumar</creator><creator>ROY, Shuvam Singha</creator><creator>VAHIDNIA, Arash</creator><creator>MAYOR, JR., Rufino Louie</creator><creator>BOREDDY, Nikhil Reddy</creator><creator>ARORA, Neha</creator><creator>BAKER, Caleb Geoffrey</creator><creator>ARORA, Himani</creator><scope>EVB</scope></search><sort><creationdate>20231214</creationdate><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><author>PUTTAGUNTA, Vasundhara ; SEHGAL, Richa ; MENON, Anand Madhava ; JINDAL, Himanshu ; MUSTAFI, Sanjoyan ; DANI, Rajalakshmi ; CHAUHAN, Sumit Kumar ; ROY, Shuvam Singha ; VAHIDNIA, Arash ; MAYOR, JR., Rufino Louie ; BOREDDY, Nikhil Reddy ; ARORA, Neha ; BAKER, Caleb Geoffrey ; ARORA, Himani</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2023401332A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>PUTTAGUNTA, Vasundhara</creatorcontrib><creatorcontrib>SEHGAL, Richa</creatorcontrib><creatorcontrib>MENON, Anand Madhava</creatorcontrib><creatorcontrib>JINDAL, Himanshu</creatorcontrib><creatorcontrib>MUSTAFI, Sanjoyan</creatorcontrib><creatorcontrib>DANI, Rajalakshmi</creatorcontrib><creatorcontrib>CHAUHAN, Sumit Kumar</creatorcontrib><creatorcontrib>ROY, Shuvam Singha</creatorcontrib><creatorcontrib>VAHIDNIA, Arash</creatorcontrib><creatorcontrib>MAYOR, JR., Rufino Louie</creatorcontrib><creatorcontrib>BOREDDY, Nikhil Reddy</creatorcontrib><creatorcontrib>ARORA, Neha</creatorcontrib><creatorcontrib>BAKER, Caleb Geoffrey</creatorcontrib><creatorcontrib>ARORA, Himani</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PUTTAGUNTA, Vasundhara</au><au>SEHGAL, Richa</au><au>MENON, Anand Madhava</au><au>JINDAL, Himanshu</au><au>MUSTAFI, Sanjoyan</au><au>DANI, Rajalakshmi</au><au>CHAUHAN, Sumit Kumar</au><au>ROY, Shuvam Singha</au><au>VAHIDNIA, Arash</au><au>MAYOR, JR., Rufino Louie</au><au>BOREDDY, Nikhil Reddy</au><au>ARORA, Neha</au><au>BAKER, Caleb Geoffrey</au><au>ARORA, Himani</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><date>2023-12-14</date><risdate>2023</risdate><abstract>Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2023401332A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T11%3A12%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PUTTAGUNTA,%20Vasundhara&rft.date=2023-12-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2023401332A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |