发明名称 AUTHORIZATION OF ACCESS TO A DATA RESOURCE IN ADDITION TO SPECIFIC ACTIONS TO BE PERFORMED ON THE DATA RESOURCE BASED ON AN AUTHORIZED CONTEXT ENFORCED BY A USE POLICY
摘要 Disclosed is a method, a device, and/or a system of authorization of access to a data resource in addition to specific actions to be performed on the data resource based on an authorized context enforced by a use policy. A computer-implemented method includes receiving a use request from a device to use a protected resource. The method extracts from a security node a use policy comprising defining an authorized context for use the protected resource. First, access to the protected resource is authorized when the use request conforms to the authorized context. Use keys are generated and returned to the device for redemption. Second, after the protected resource is streamed to the device, a process of the device monitors use of and enforce ephemerality of the protected resource by maintaining an active use ledger. A use policy update may generate new use terms that are pushed to the device, terminating use.
申请公布号 US2017034217(A1) 申请公布日期 2017.02.02
申请号 US201615230424 申请日期 2016.08.07
申请人 CloudMode, LLC 发明人 Anton Dhryl;McFall Michael
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A computer-implemented method for authorizing and controlling use of a data resource, the method comprising: receiving a use request from a device to use a protected resource stored in a data node of a non-hierarchical data structure within a datastore, wherein the data node comprising an identifier whereby the data node is addressable within the datastore; extracting from at least one of the data node and a security node having a referential attribute pointing to the data node a use policy comprising computer-readable instructions defining an authorized context for which the device can use the protected resource based on one or more contextual values; initiating a use transaction that executes the computer-readable instructions of the use policy to gather the one or more contextual values and to determine whether the use request satisfies the authorized context for which the device can use the protected resource; authorizing access to the protected resource by the device when it is determined that based on the contextual values that the use request conforms to the authorized context for which the device may use the protected resource; generating a use terms from the computer-readable instructions defining the authorized context for the use request; generating a set of one or more use keys and appending the identifier of the protected resource to each of the set of one or more use keys to form one or more key-identifier pairs; associating an expiration condition with each of the one or more key-identifier pairs; returning a first use key of the set of one or more use keys to the device; receiving a redemption request from the device comprising the first use key and verifying the first use key; extracting the identifier of the protected resource from a first key-identifier pair of the one or more key-identifier pairs and retrieving the protected resource with the identifier of the protected resource; and streaming the protected resource to the device for use by the device.
地址 Henderson NV US