CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA

Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: PUTTAGUNTA, Vasundhara, SEHGAL, Richa, MENON, Anand Madhava, JINDAL, Himanshu, MUSTAFI, Sanjoyan, DANI, Rajalakshmi, CHAUHAN, Sumit Kumar, ROY, Shuvam Singha, VAHIDNIA, Arash, MAYOR, JR., Rufino Louie, BOREDDY, Nikhil Reddy, ARORA, Neha, BAKER, Caleb Geoffrey, ARORA, Himani
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator PUTTAGUNTA, Vasundhara
SEHGAL, Richa
MENON, Anand Madhava
JINDAL, Himanshu
MUSTAFI, Sanjoyan
DANI, Rajalakshmi
CHAUHAN, Sumit Kumar
ROY, Shuvam Singha
VAHIDNIA, Arash
MAYOR, JR., Rufino Louie
BOREDDY, Nikhil Reddy
ARORA, Neha
BAKER, Caleb Geoffrey
ARORA, Himani
description Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2023401332A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2023401332A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2023401332A13</originalsourceid><addsrcrecordid>eNrjZDBw9vcLCfL38fH0c1dwDAjw8XR2DPH091NwdHZ2DQ5WCPFXCHb1C_YM8QxzVXBxDHHkYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkbGJgaGxsZGjobGxKkCANXRJzs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><source>esp@cenet</source><creator>PUTTAGUNTA, Vasundhara ; SEHGAL, Richa ; MENON, Anand Madhava ; JINDAL, Himanshu ; MUSTAFI, Sanjoyan ; DANI, Rajalakshmi ; CHAUHAN, Sumit Kumar ; ROY, Shuvam Singha ; VAHIDNIA, Arash ; MAYOR, JR., Rufino Louie ; BOREDDY, Nikhil Reddy ; ARORA, Neha ; BAKER, Caleb Geoffrey ; ARORA, Himani</creator><creatorcontrib>PUTTAGUNTA, Vasundhara ; SEHGAL, Richa ; MENON, Anand Madhava ; JINDAL, Himanshu ; MUSTAFI, Sanjoyan ; DANI, Rajalakshmi ; CHAUHAN, Sumit Kumar ; ROY, Shuvam Singha ; VAHIDNIA, Arash ; MAYOR, JR., Rufino Louie ; BOREDDY, Nikhil Reddy ; ARORA, Neha ; BAKER, Caleb Geoffrey ; ARORA, Himani</creatorcontrib><description>Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231214&amp;DB=EPODOC&amp;CC=US&amp;NR=2023401332A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20231214&amp;DB=EPODOC&amp;CC=US&amp;NR=2023401332A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>PUTTAGUNTA, Vasundhara</creatorcontrib><creatorcontrib>SEHGAL, Richa</creatorcontrib><creatorcontrib>MENON, Anand Madhava</creatorcontrib><creatorcontrib>JINDAL, Himanshu</creatorcontrib><creatorcontrib>MUSTAFI, Sanjoyan</creatorcontrib><creatorcontrib>DANI, Rajalakshmi</creatorcontrib><creatorcontrib>CHAUHAN, Sumit Kumar</creatorcontrib><creatorcontrib>ROY, Shuvam Singha</creatorcontrib><creatorcontrib>VAHIDNIA, Arash</creatorcontrib><creatorcontrib>MAYOR, JR., Rufino Louie</creatorcontrib><creatorcontrib>BOREDDY, Nikhil Reddy</creatorcontrib><creatorcontrib>ARORA, Neha</creatorcontrib><creatorcontrib>BAKER, Caleb Geoffrey</creatorcontrib><creatorcontrib>ARORA, Himani</creatorcontrib><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><description>Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDBw9vcLCfL38fH0c1dwDAjw8XR2DPH091NwdHZ2DQ5WCPFXCHb1C_YM8QxzVXBxDHHkYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkbGJgaGxsZGjobGxKkCANXRJzs</recordid><startdate>20231214</startdate><enddate>20231214</enddate><creator>PUTTAGUNTA, Vasundhara</creator><creator>SEHGAL, Richa</creator><creator>MENON, Anand Madhava</creator><creator>JINDAL, Himanshu</creator><creator>MUSTAFI, Sanjoyan</creator><creator>DANI, Rajalakshmi</creator><creator>CHAUHAN, Sumit Kumar</creator><creator>ROY, Shuvam Singha</creator><creator>VAHIDNIA, Arash</creator><creator>MAYOR, JR., Rufino Louie</creator><creator>BOREDDY, Nikhil Reddy</creator><creator>ARORA, Neha</creator><creator>BAKER, Caleb Geoffrey</creator><creator>ARORA, Himani</creator><scope>EVB</scope></search><sort><creationdate>20231214</creationdate><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><author>PUTTAGUNTA, Vasundhara ; SEHGAL, Richa ; MENON, Anand Madhava ; JINDAL, Himanshu ; MUSTAFI, Sanjoyan ; DANI, Rajalakshmi ; CHAUHAN, Sumit Kumar ; ROY, Shuvam Singha ; VAHIDNIA, Arash ; MAYOR, JR., Rufino Louie ; BOREDDY, Nikhil Reddy ; ARORA, Neha ; BAKER, Caleb Geoffrey ; ARORA, Himani</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2023401332A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>PUTTAGUNTA, Vasundhara</creatorcontrib><creatorcontrib>SEHGAL, Richa</creatorcontrib><creatorcontrib>MENON, Anand Madhava</creatorcontrib><creatorcontrib>JINDAL, Himanshu</creatorcontrib><creatorcontrib>MUSTAFI, Sanjoyan</creatorcontrib><creatorcontrib>DANI, Rajalakshmi</creatorcontrib><creatorcontrib>CHAUHAN, Sumit Kumar</creatorcontrib><creatorcontrib>ROY, Shuvam Singha</creatorcontrib><creatorcontrib>VAHIDNIA, Arash</creatorcontrib><creatorcontrib>MAYOR, JR., Rufino Louie</creatorcontrib><creatorcontrib>BOREDDY, Nikhil Reddy</creatorcontrib><creatorcontrib>ARORA, Neha</creatorcontrib><creatorcontrib>BAKER, Caleb Geoffrey</creatorcontrib><creatorcontrib>ARORA, Himani</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>PUTTAGUNTA, Vasundhara</au><au>SEHGAL, Richa</au><au>MENON, Anand Madhava</au><au>JINDAL, Himanshu</au><au>MUSTAFI, Sanjoyan</au><au>DANI, Rajalakshmi</au><au>CHAUHAN, Sumit Kumar</au><au>ROY, Shuvam Singha</au><au>VAHIDNIA, Arash</au><au>MAYOR, JR., Rufino Louie</au><au>BOREDDY, Nikhil Reddy</au><au>ARORA, Neha</au><au>BAKER, Caleb Geoffrey</au><au>ARORA, Himani</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA</title><date>2023-12-14</date><risdate>2023</risdate><abstract>Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2023401332A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T11%3A12%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=PUTTAGUNTA,%20Vasundhara&rft.date=2023-12-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2023401332A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true