18076933. DATA AUTHORIZATION EVALUATION FRAMEWORK simplified abstract (SAP SE)

From WikiPatents
Jump to navigation Jump to search

DATA AUTHORIZATION EVALUATION FRAMEWORK

Organization Name

SAP SE

Inventor(s)

Patrick Hildenbrand of Neulussheim (DE)

Vytas Cirpus of Waldsee (DE)

DATA AUTHORIZATION EVALUATION FRAMEWORK - A simplified explanation of the abstract

This abstract first appeared for US patent application 18076933 titled 'DATA AUTHORIZATION EVALUATION FRAMEWORK

Simplified Explanation: The patent application discusses techniques for evaluating data access restrictions for computing objects, where data access restrictions are defined and stored in attributes across multiple computing objects.

  • Data access restrictions are defined for a computing object that can access data from other computing objects.
  • Attributes storing data access restrictions are copied to a second set of computing objects.
  • A data access authorization request is received, including user information and the computing object identifier.
  • Data is retrieved from computing objects based on the request, or an authorization result is determined and returned.

Key Features and Innovation:

  • Evaluation of data access restrictions for computing objects.
  • Storage and copying of data access restrictions across multiple computing objects.
  • Handling data access authorization requests based on user information and computing object identifiers.

Potential Applications: The technology can be applied in various industries such as cybersecurity, data management, and access control systems.

Problems Solved: The technology addresses the need for efficient evaluation and management of data access restrictions across multiple computing objects.

Benefits:

  • Enhanced data security and access control.
  • Improved data management and authorization processes.
  • Streamlined evaluation of data access restrictions.

Commercial Applications: Potential commercial applications include data security software, access control systems, and data management platforms for businesses.

Prior Art: Readers can explore prior art related to data access restrictions, computing object evaluation, and data security protocols.

Frequently Updated Research: Stay updated on the latest research in data access restrictions, cybersecurity protocols, and data management technologies.

Questions about Data Access Restrictions: 1. What are the key challenges in managing data access restrictions across multiple computing objects? 2. How does the technology ensure secure data access while maintaining efficiency and usability?


Original Abstract Submitted

Techniques and solutions are provided for evaluating data access restrictions. Data access restrictions are defined for a first computing object that includes data, or is usable to retrieve data, from one or more other computing objects. Data defining the data access restrictions is stored in attributes for a first plurality of computing objects. Values for less than all of the attributes are copied to a second plurality of computing objects, where the second plurality of computing objects is less than the first plurality of computing objects. A data access authorization request is received that includes, or information sufficient to identify, a user or user group identifier, and an identifier of the first computing object. Data is retrieved from at least a portion of one or more computing objects, and is returned in response to the request, or an authorization result is determined and returned in response to the request.