发明名称 |
HIERARCHICAL DATA SECURITY |
摘要 |
A computing system comprises, in one example, a user interface component configured to generate a data security configuration interface that displays user input mechanisms and receives user configuration inputs, and a data security component configured to control user data access. The data security component comprises a plurality of configurable security objects arranged in a security hierarchy. The configuration inputs associate at least one user with each security object in the security hierarchy to define a data access relationship between the users associated with the security objects. The data security component comprises a data access component configured to receive a data access request from a given user, identify a set of users that are associated with security objects in the security hierarchy relative to a security object to which the given user is associated, and provide the given user with access to data objects that are associated with the set of users. |
申请公布号 |
US2016205081(A1) |
申请公布日期 |
2016.07.14 |
申请号 |
US201514596930 |
申请日期 |
2015.01.14 |
申请人 |
Microsoft Technology Licensing, LLC |
发明人 |
Simons Brandon J.;Hariharan Mahesh;Lewis Elliot S.;Kumar Devendra;Shenoy Atul |
分类号 |
H04L29/06;G06F3/0484;H04L12/24 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A computing system comprising:
a user interface component configured to generate a data security configuration interface that displays user input mechanisms and receives user configuration inputs; and a data security component configured to control user data access, the data security component comprising:
a plurality of configurable security objects arranged in a security hierarchy, wherein the configuration inputs associate at least one user with each security object in the security hierarchy to define a data access relationship between the users associated with the security objects; anda data access component configured to receive a data access request from a given user, identify a set of users that are associated with security objects in the security hierarchy relative to a security object to which the given user is associated, and provide the given user with access to data objects that are associated with the set of users. |
地址 |
Redmond WA US |