17643847. RECERTIFICATION OF ACCESS CONTROL INFORMATION BASED ON CONTEXT INFORMATION ESTIMATED FROM NETWORK TRAFFIC simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

RECERTIFICATION OF ACCESS CONTROL INFORMATION BASED ON CONTEXT INFORMATION ESTIMATED FROM NETWORK TRAFFIC

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Gianluca Gargaro of Roma (IT)

Raffaele Giulio Sperandeo of Marcianise (IT)

Luigi Lombardi of Napoli (IT)

Davide Fazzone of Baiano (IT)

RECERTIFICATION OF ACCESS CONTROL INFORMATION BASED ON CONTEXT INFORMATION ESTIMATED FROM NETWORK TRAFFIC - A simplified explanation of the abstract

This abstract first appeared for US patent application 17643847 titled 'RECERTIFICATION OF ACCESS CONTROL INFORMATION BASED ON CONTEXT INFORMATION ESTIMATED FROM NETWORK TRAFFIC

Simplified Explanation

The present disclosure is about a method for facilitating the recertification of access control information in a network. The method involves collecting network traffic information and estimating context information from this data for accesses to a software application. The context information is estimated by an estimation engine that is configured during a migration of the software application from a module architecture to a service architecture.

  • The method collects network traffic information related to a network.
  • Context information is estimated from the network traffic information for accesses to a software application.
  • The context information is estimated by an estimation engine that is configured incrementally during a migration of the software application from a module architecture to a service architecture.
  • The estimation engine uses the network traffic information and corresponding log information to estimate the context information.
  • A computer program and a computer program product for performing the method are also proposed.
  • A system for implementing the method is proposed.

Potential Applications

This technology can be applied in various industries and scenarios, including:

  • Network security: The method can help in ensuring that access control information is recertified accurately and efficiently, enhancing the security of the network.
  • Software development: The method can assist in the migration of software applications from a module architecture to a service architecture, improving the overall efficiency and performance of the software.

Problems Solved

This technology addresses the following problems:

  • Access control recertification: The method simplifies and automates the process of recertifying access control information, reducing the manual effort and potential errors associated with this task.
  • Migration challenges: The method provides a solution for migrating software applications from a module architecture to a service architecture, which can be a complex and time-consuming process.

Benefits

The use of this technology offers several benefits, including:

  • Improved efficiency: The method streamlines the recertification process, saving time and effort for network administrators.
  • Enhanced accuracy: By estimating context information from network traffic, the method ensures that access control information is recertified accurately, reducing the risk of unauthorized access.
  • Simplified migration: The method facilitates the migration of software applications, making it easier to transition from a module architecture to a service architecture.


Original Abstract Submitted

The present disclosure relates to facilitating a recertification of access control information. A corresponding method comprises collecting network traffic information relating to a network. Context information is estimated from the network traffic information for accesses to the software application relating to invocations over the network of services contributing (at least in part) to implement the software application. For example, the context information is estimated by an estimation engine that is configured incrementally during a migration of the software application from a module architecture to a service architecture (according to the network traffic information and to corresponding log information). A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.