Method, system and program product for verifying access to a data object
a data object and verification method technology, applied in the field of verification of user access to a data object, can solve the problems of limiting the number of users that can access a certain data object, wasting time, and often failing to be consistently and reliably performed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0022] As indicated above, the invention provides a solution for verifying access to a data object. Specifically, the invention automatically determines when access to a data object requires verification, and provides an owner of the data object a set of current users that currently can access it. The set of current users can be selected from a set of current user groups and a set of additional users that currently have access to the data object. In one embodiment, an indication of one or more attributes of each user in the set of current users is also provided to the owner. The owner can review the set of current users and respond appropriately. For example, the owner can respond by providing a set of verified users. Access information, such as a verification history and the set of current users, can be updated based on the response from the owner. As a result, the invention provides an improved solution for verifying access to the data object.
[0023] Turning to the drawings, FIG. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


