发明名称 |
Owner-controlled access control to released data |
摘要 |
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for receiving, from a computing device used by an authenticated user, a validation request, the validation request including a first hash value and a first validation token, the first hash value being generated based on restricted content of a workflow object and the first validation token being associated with a first state of the workflow object, and determining that the authenticated user is authorized to request validation of the workflow object and, in response: decrypting the validation token to provide a second hash value, and determining that the second hash value is equal to both the first hash value and a third hash value and, in response, transmitting a validation response to the computing device, the validation response indicating that the workflow object is valid. |
申请公布号 |
US9361467(B2) |
申请公布日期 |
2016.06.07 |
申请号 |
US201213408267 |
申请日期 |
2012.02.29 |
申请人 |
SAP SE |
发明人 |
Bracher Shane;Krishnan Padmanabhan |
分类号 |
H04L9/32;G06F21/62 |
主分类号 |
H04L9/32 |
代理机构 |
Fish & Richardson P.C. |
代理人 |
Fish & Richardson P.C. |
主权项 |
1. A computer-implemented method for controlling access to a workflow object, the method being executed using one or more processors and comprising:
receiving, from a computing device used by an authenticated user, a validation request, the validation request comprising a first hash value and a first validation token, the first hash value being generated based on restricted content of a workflow object comprising a document assigned to a pre-defined workflow spanning through a plurality of domains, and the first validation token indicating a validity of the workflow object and being associated with a first state of a plurality of states of the workflow object, the plurality of the states denoting an evolution of the workflow object; and determining that the authenticated user is authorized to request validation of the workflow object and, in response:
decrypting the validation token to provide a second hash value; anddetermining that the second hash value is equal to both the first hash value and a third hash value and, in response, transmitting a validation response to the computing device, the validation response indicating that the workflow object is valid. |
地址 |
Walldorf DE |