Consent-Driven Access Management For Cloud Resources

    公开(公告)号:US20240364707A1

    公开(公告)日:2024-10-31

    申请号:US18647781

    申请日:2024-04-26

    CPC classification number: H04L63/108

    Abstract: Techniques for consent-driven access management include: receiving, from a requestor, a request for consent for an actor to access a target set of resources in a cloud environment; identifying a consent workflow that specifies a name and/or an attribute of a set of one or more users from which to obtain respective approvals of the consent request; traversing the consent workflow to obtain the respective approvals from the set of one or more users; determining that one or more access policies, separate from the consent workflow, permit the actor to access the target set of resources; where access by the actor to the target set of resources is conditioned on both (a) obtaining the respective approvals from the set of one or more users and (b) determining that the one or more access policies, separate from the consent workflow, permit the actor to access the target set of resources.

    SYSTEM AND METHOD FOR CONTINUOUS MONITORING AND REVOCATION OF DEVICE ACCESS AUTHORIZATION

    公开(公告)号:US20240364705A1

    公开(公告)日:2024-10-31

    申请号:US18422966

    申请日:2024-01-25

    CPC classification number: H04L63/108

    Abstract: A new approach is proposed to support an authorization server to continuously monitor and revoke device access authorization to a plurality of resources. A client device associated with a user or consumer first sends a request to the authorization server for authorization to access or perform certain operations on one or more resources. Upon receiving the request, the authorization server makes an initial authorization determination on whether to grant or deny the request for authorization to the one or more resources by the client device based on the type of the request and/or the one or more resources requested to access. After an initial authorization determination is made, the authorization server continues to monitor the resources being accessed and update the initial authorization determination to the client device in real time. An live update in the authorization determination is then provided to the client device in real time.

    Adaptive distributed backoff scheme

    公开(公告)号:US12132740B2

    公开(公告)日:2024-10-29

    申请号:US17696061

    申请日:2022-03-16

    CPC classification number: H04L63/108

    Abstract: Clients that fail to access a resource may compute backoff times for waiting before retrying to access the resource. The clients may reference a sequence of time windows where the time windows may have increasing numbers of time slots. The clients may select respective time slots in a first time window. If the clients again fail to access the resource, then the time slots selected by the clients may at least partly determine which time slots the clients select in a next (second) time window. The time slot selections in the second time window may be at least partly randomly selected. A client may randomly select a time slot in the second time window from among a proper subset of time slots in the second time window. The proper subset may be based on which time slot the client selected in the first time window.

    Secure remote access to historical data

    公开(公告)号:US12107835B2

    公开(公告)日:2024-10-01

    申请号:US18391369

    申请日:2023-12-20

    Inventor: Andrew S. Thomas

    CPC classification number: H04L63/029 H04L63/0218 H04L63/108

    Abstract: Methods, systems, and computer products facilitate access to historical data via a real-time tunnel within an architectural framework that encompasses an operational technology (OT) network, a de-militarized zone (DMZ), and an information technology (IT) network. Real-time data is retrieved from a data source using a first connector, which comprises a first tunneller, a first history-writer, and a first history-tunneller. The mechanisms involve interleaving real-time data and historical data over a first tunnel connection, a first firewall, and a second firewall by (a) executing pull replication of the historical data, (b) daisy-chaining the historical data, or (c) a combination of both (a) and (b). Subsequently, the real-time data is written to a first historian.

    Data subject request tiering
    8.
    发明授权

    公开(公告)号:US12086285B1

    公开(公告)日:2024-09-10

    申请号:US16915908

    申请日:2020-06-29

    Abstract: A method of providing a data disclosure to a requester can include: receiving a data subject request from a requester, the data subject request including a request for stored personal data; categorizing the element data into one of a plurality of tiers based on a sensitivity level of the element data; assigning an assigned tier to the element data and associated data values; determining a level of detail of the associated data values for each of the element data to provide based on the assigned tier; and providing a data disclosure report to the requester, wherein the data disclosure report includes the level of detail of data values for each of the element data based on the assigned tier.

Patent Agency Ranking