Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and system for preventing electronic data object from unauthorized access

A technology for unauthorized access and data objects, which is used in electrical digital data processing, digital data protection, digital data processing components, etc., and can solve the problems of unknown number of data objects and where they appear

Inactive Publication Date: 2004-09-22
SIEMENS AG
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Conventional control mechanisms thus cannot be performed on all data objects, since the number of data objects and where they occur are not known

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing electronic data object from unauthorized access
  • Method and system for preventing electronic data object from unauthorized access
  • Method and system for preventing electronic data object from unauthorized access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] A data processing system for implementing the invention is shown in FIG. 1 . The system comprises a data processing device 1 with a display 3 and a keyboard 5 via which electronic data objects can be accessed. The data objects that can be accessed are located in the application memory 9 . Access to data objects in the application memory 9 is controlled by the access control module 7 .

[0029] The access control module 7 works independently of the operating system's access control mechanisms (eg, relying on user-specific file-specific ACLs). In a preferred configuration, it is designed as an additional program layer (data access layer) and can be connected to the data bus of the data processing device 1 as a modular hardware component. However, its implementation can also take place within the data processing device 1 only on a software level. The access control module 7 controls all data accesses to the data objects it controls, such as deletion, copying, creation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention concerns a method and a data processing system to protect an electronic data object from unauthorized access. Via a method, a) in a first step, an electronic data object identifier is generated dependent on the content of the data object, b) in a further step, an access right is determined dependent on the data object identifier, and c) in a last step, an access to the data object is allowed dependent of the access right. The data processing system comprises a data processing device and an access control module. Via the access control module, an electronic data object identifier can be generated dependent on the content of a data object, and an access right can be determined dependent on the data object identifier. The access right can comprises standard rights such as 'Read' or 'Write' and an 'Execute' right to execute specific functionalities.

Description

technical field [0001] The invention relates to a method for protecting electronic data objects from unauthorized access, to a data processing system implementing the method, and to a storage medium on which information for implementing the method at a data processing device is stored. Background technique [0002] The increasing use of electronic data objects requires more and more intelligent mechanisms for protecting electronic data objects from unauthorized access. In this case, a data object can be, for example, an individual file, an integrated file system or a file structure for storing or storing information. The protection of data objects is especially important in workplaces that are used by multiple people and from which confidential information can be called up. Such information occurs in, among others, medical work environments, in laboratories, research, development, etc. or work environments where demographics are performed. Basically, especially personal in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
CPCG06F21/6245G06F21/6236
Inventor 德特莱夫·贝克尔卡尔海因茨·多恩伊凡·墨菲格哈德·蒙妮赫托马斯·波利
Owner SIEMENS AG
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More