Unlock instant, AI-driven research and patent intelligence for your innovation.

tenant lock box

A technology for tenants and operators, applied in the direction of instruments, calculations, electrical digital data processing, etc., can solve problems such as incomplete control of data

Active Publication Date: 2020-06-26
MICROSOFT TECH LICENSING LLC
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, in software-as-a-service (SaaS) or cloud service systems, business-critical customer data is often stored in the cloud, where customers do not have full control over access to their data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • tenant lock box
  • tenant lock box
  • tenant lock box

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The following detailed description refers to the accompanying drawings. Wherever possible, the same reference numbers are used in the drawings and the following description to refer to the same or like elements. While aspects of the invention may be described, modifications, adaptations, and other implementations are possible. For example, substitutions, additions, or modifications may be made to elements shown in the figures, and the methods described herein may be modified by substituting, reordering, or adding stages to the disclosed methods. Therefore, the following detailed description does not limit the present invention, but the proper scope of the present invention is defined by the appended claims. Examples may take the form of a hardware implementation, or an entirely software implementation, or an implementation combining software and hardware aspects. Therefore, the following detailed description should not be interpreted in a limiting sense.

[0014] Asp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provides permissions for operators to access tenant data. To grant a service worker operator access to a tenant's data to perform the requested action, the lockbox determines the security grouping roles the operator needs to be elevated to to perform the requested action, computes an internal set of roles authorized to grant temporary role elevation administrators and tenant administrators, and send access control requests to said administrators. After receiving approval for the access control request from internal administrators and tenant administrators, the lockbox promotes the operator to a security group role, granting the operator the set of permissions needed to allow the operator to perform the requested action. This enables tenants to control access to their data and review access requests against their corporate processes and compliance needs.

Description

Background technique [0001] There are various scenarios where support staff needs to access customer data on the customer's behalf, for example when making changes in the system as corrective action, or to perform intrusive debugging of customer-specific issues. When accessing customer data, whether on-premises or in the cloud, there is a need for security measures. For example, in software-as-a-service (SaaS) or cloud service systems, business-critical customer data is often stored in the cloud, where customers do not have full control over access to their data. For example, various administrators, engineers, and other support personnel of the cloud service provider may gain access to customer data via an access control system not controlled by the customer. Thus, such access to customer data that is not visible to the customer subjects the cloud service provider to increased scrutiny from the customer, for example, the customer may be concerned about why the cloud service p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/604H04L63/08H04L63/102H04L63/20G06F21/6218H04L63/101H04L63/104
Inventor R·达尼A·M·梅农P·H·里奇N·马丹V·阿胡贾S·马图尔L·朱
Owner MICROSOFT TECH LICENSING LLC