18055285. DYNAMIC AUTHORIZATION BASED ON EXECUTION PATH STATUS simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

DYNAMIC AUTHORIZATION BASED ON EXECUTION PATH STATUS

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Hemant Kumar Sivaswamy of Pune (IN)

Anuj Chandra of Pune (IN)

Nadiya Kochura of Bolton MA (US)

Tiberiu Suto of Franklin NY (US)

DYNAMIC AUTHORIZATION BASED ON EXECUTION PATH STATUS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18055285 titled 'DYNAMIC AUTHORIZATION BASED ON EXECUTION PATH STATUS

Simplified Explanation

The patent application describes a method for dynamic authorization based on execution path status, where node access authorizations are automatically generated based on the most probable execution path for a current user.

  • The method involves identifying multiple execution paths in prior authorization data, each containing multiple nodes.
  • These execution paths are then ranked according to probability, with the most probable path determined for the current user based on their current node.
  • Node access authorizations are generated based on at least part of the most probable execution path.

Potential Applications

This technology could be applied in various industries such as cybersecurity, access control systems, and software development.

Problems Solved

This technology solves the problem of efficiently managing and granting access permissions based on the most likely execution path for a user, reducing the risk of unauthorized access.

Benefits

The benefits of this technology include improved security, streamlined access control processes, and enhanced user experience by providing the right level of access at the right time.

Potential Commercial Applications

A potential commercial application of this technology could be in the development of secure authentication systems for online platforms.

Possible Prior Art

One possible prior art for this technology could be traditional access control systems that rely on static authorization rules rather than dynamic path-based authorizations.

Unanswered Questions

How does this technology handle changes in user behavior over time?

The article does not address how the system adapts to changes in user behavior and updates the most probable execution path accordingly.

What measures are in place to prevent unauthorized access in case of deviations from the most probable path?

The article does not mention any specific safeguards or protocols to prevent unauthorized access if a user deviates from the most probable execution path.


Original Abstract Submitted

A method is provided for dynamic authorization based on execution path status. The method includes identifying a plurality of execution paths in prior authorization data, in which each execution path contains a plurality of nodes. The identified plurality of execution paths are ranked according to probability. At least part of a most probable execution path from among the ranked plurality of execution paths is determined for a current user based on a current node. Node access authorizations are automatically generated based on the at least part of the determined most probable execution path.