Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ACCESS TO CONFIDENTIAL DATA
Document Type and Number:
WIPO Patent Application WO/2022/093168
Kind Code:
A1
Abstract:
The present specification describes a method. According to the method, a request by a first user to access confidential data is received. Login credentials provided by the first user are also received. Based on the request and identification of the first user, a determination of a security classification for the request is made. A request is made for information from second users associated with the security classification. Based on the information received from the second users, a determination is made as to whether or not to grant access to the first user. Based on the determination, the first user is provided with access to the confidential data.

Inventors:
VALVASSORI CARLOS SILVANO (BR)
Application Number:
PCT/US2020/057330
Publication Date:
May 05, 2022
Filing Date:
October 26, 2020
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
HEWLETT PACKARD DEVELOPMENT CO (US)
International Classes:
G06F21/62
Foreign References:
US20180107731A12018-04-19
US9369433B12016-06-14
US9411966B12016-08-09
CN111770081A2020-10-13
Attorney, Agent or Firm:
JENNEY, Michael et al. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1 . A method, comprising: receiving a request from a first user to access confidential data; receiving login credentials for the first user; based on the request and identification of the first user, determining a security classification for the request; requesting information from second users associated with the security classification; based on the information received from the second users, determining whether or not to grant access to the first user; and providing the first user with access to the confidential data based on the determination.

2. The method of claim 1 , further comprising: providing the confidential data to the first user as long as an active state of the second users is found.

3. The method of claim 1 , further comprising: defining the security classification; allocating second users to the security classification; and defining information to be obtained from the second users when a request is classified to the security classification.

4. The method of claim 3, wherein the information received from the second users includes at least one of a password, a countersign, a fingerprint, a facial biometric, a voice biometric, identification information for a device, and a specific location from a global positioning system (GPS).

5. The method of claim 1 , further comprising: allocating a time period for which the second users may respond by providing the information to log in.

6. The method of claim 1 , further comprising: maintaining the confidentiality of the confidential data such that the second users do not have access to the confidential data while the first user has access.

7. The method of claim 1 , further comprising: decrypting the confidential data while the first user has access, and encrypting the confidential data when the first user has no access.

8. A system, comprising: a non-transitory memory to store instructions; a computer processor to execute the instructions to perform operations, the operations comprising: receiving a request from a first user to access confidential data; receiving login credentials for the first user; based on the request and identification of the first user, determining a security classification for the request that is based on an associated level of security; requesting information from second users associated with the security classification and associated level of security; based on the information received, determining whether or not access should be granted to the first user; and providing the first user with access to the confidential data based on the determination for as long as an active state of the second users is found.

9. The system of claim 8, further comprising: defining security classifications with associated levels of security; and defining a group of second users for each security classification.

10. The system of claim 9, further comprising: defining an administrator over at least one group of second users associated with at least one security classification, the at least one security classification being a higher level of security relative to another security classification; registering a location of the administrator with global positioning system (GPS) information for the administrator; receiving the location of the administrator as part of the information from a second user; and verifying the location of the administrator with the registered location prior to providing the first user with access to the confidential data.

11 . The system of claim 10, wherein the location is in at least one of a delimited region, a city, or a neighborhood.

12. The system of claim 8, further comprising: registering devices of the second users; verifying the registration of the devices of the second users prior to providing the first user with access to the confidential data.

13. The system of claim 8, further comprising: providing a wait-in portal that holds information that is received until all of the second users have provided information, the wait-in portal being open for a set period of time.

14. A non-transitory computer readable medium comprising computer usable program code, the computer usable program code to, when executed by a processor: receive a request from a first user to access confidential data; receive login credentials for the first user; receive a location of the user as provided by a global positioning system

(GPS);

16 based on the request, identification, and location of the first user, determine a security classification and associated security level for the request; request information from second users associated with the security classification and associated security level; based on the information received and a location of each second user; determine whether or not access should be granted to the first user; and provide the first user with access to the confidential data based on the determination.

15. The non-transitory computer readable medium of claim 14, further comprising the processor to notify the second users of the first user and the requested confidential data prior to requested the information.

17

Description:
ACCESS TO CONFIDENTIAL DATA

BACKGROUND

[0001] Information is widely disseminated over computer systems, and confidential data is one type of information that is shared across a network. Confidential data is data that should be accessible by certain individuals and not others.

BRIEF DESCRIPTION OF THE DRAWINGS

[0002] The accompanying drawings illustrate various implementations of the principles described herein and are a part of the specification. The illustrated implementations are merely examples and do not limit the scope of the claims.

[0003] Fig. 1 is a block diagram of a system for granting access to confidential data, according to an example of principles described herein.

[0004] Fig. 2 is a flowchart illustrating a method for granting access to confidential data, according to an example of principles described herein.

[0005] Fig. 3 is a diagram for granting access to confidential data, according to an example of principles described herein.

[0006] Fig. 4 is a diagram for granting access to confidential data, according to an example of principles described herein.

[0007] Fig. 5 is a diagram for granting access to confidential data, according to an example of principles described herein. [0008] Fig. 6 depicts a non-transitory machine-readable storage medium for granting access to confidential data, according to an example of the principles described herein.

[0009] Throughout the drawings, identical reference numbers designate similar, but not necessarily identical, elements.

DETAILED DESCRIPTION

[0010] In the following description, for purposes of explanation, specific details are set forth in order to provide a thorough understanding of the disclosure. It will be apparent, however, to one skilled in the art that examples consistent with the present disclosure may be practiced without these specific details. Reference in the specification to “an implementation,” “an example” or similar language means that a particular feature, structure, or characteristic described in connection with the implementation or example is included in at least that one implementation, but not necessarily in other implementations. The various instances of the phrase “in one implementation” or similar phrases in various places in the specification are not necessarily all referring to the same implementation.

[0011 ] A leak of confidential data, whether it be the result of a malicious invasion, an accident, a security breach, or other action, may harm a company. The negative impact on the company may be caused by the use of the confidential data obtained. The impact may be profound and cause disruptions to business productivity and loss of trade secrets.

[0012] Actions taken by a single user in order to access confidential data may be the cause of the leak. Therefore, it is proposed that actions taken by a group of users be used to make the confidential data available to the single user and thus prevent the likelihood that a leak will occur. It is also proposed that data access be contingent on group behavior to provide a buffer against potential leaks. Particularly, information obtained from each member of the group is used to provide a buffer against potential leaks. [0013] In order to handle various breaches of confidentiality, a method is described herein in which shared confidential data is not available to a single user. Instead, the shared confidential data is available to a group of members to which the user belongs and thus user access to the confidential data is contingent on the group of members. Access to the shared confidential data is made available to a single user on the basis of information being provided by members of a group. In an example, the members may be presently logged in before and as the access is provided to the user.

[0014] In this manner, confidential data may be protected to ensure that a particular person or persons may access the confidential data while others may not. Particularly, confidential data may be protected to ensure that it may be accessed by a member or members of a group but not by others outside of the group. The confidential data may include any type of data that is desired to be secured with shared access to members of a group. Also, the access methods provided herein are reliable to serve various sized groups and groups with different situations.

[0015] An example of a method includes the receipt of a request from a first user to access confidential data. This further includes receipt of login credentials provided for the first user. Based on the request and identification of the first user, a determination of a security classification for the request is made. A request is made for information from second users associated with the security classification. Based on the information received from the second users, a determination is made as to whether or not to grant access to the first user. Based on the determination, the first user is provided with access to the confidential data.

[0016] The method may further include that the confidential data be provided to the first user as long as an active state of the second users is found.

[0017] The method may further include that the security classification be defined and that second users be allocated to the security classification. Information to be obtained from second users when a request is classified to the security classification may be defined. [0018] The method may further include that the information received from the second users includes at least one of a password, a countersign, a fingerprint, a facial biometric, a voice biometric, identification information for a device, and a specific location from a global positioning system (GPS).

[0019] The method may further include the allocation of a time period for which the second users may respond by providing the information to log in.

[0020] The method may further include maintaining the confidentiality of the confidential data such that the second users do not have access to the confidential data while the first user has access.

[0021] The method may further include the decryption of the confidential data while the first user has access, and the encryption of the confidential data when the first user has no access.

[0022] An example of a system includes a non-transitory memory to store instructions. A computer processor executes the instructions to perform operations. The operations include the receipt of a request from a first user to access confidential data. Upon receipt of the login credentials for the first user and based on the request and identification of the first user, a determination is made as to a security classification for the request that is based on an associated level of security. A request is made for information from second users associated with the security classification and associated level of security. Based on the information received, it is determined whether or not access should be granted to the first user. Based on the determination, the first user is provided with access to the confidential data for as long as an active state of the second users is found.

[0023] The system may further include a definition of security classifications with associated levels of security, and a definition of a group of second users for each security classification.

[0024] The system may further include a definition of an administrator over at least one group of second users associated with at least one security classification being a higher level of security relative to another security classification. A location of the administrator with global positioning system (GPS) information for the administrator is registered. The location of the administrator is received as part of the information from a second user. Also, the location of the administrator with the registered location is verified prior to providing the first user with access to the confidential data. Verification is done by determining whether or not the administrator has the same GPS information that is stored in the system. In another example, the type of GPS information is verified such that it includes a region, city, or neighborhood. Further examples include that the system verifies a specific region, city, or neighborhood. In an example, a “Top Secret” group is to have a location verified by GPS.

[0025] The system further includes that the location is in at least one of a delimited region, a city, or a neighborhood.

[0026] The system further includes the registration of devices of the second users and the verification of the registration of the devices of the second users prior to providing the first user with access to the confidential data.

[0027] The system further includes that a wait-in portal be provided that holds information that is received until all of the second users have provided information. The wait-in portal is open for a set period of time.

[0028] A non-transitory computer readable medium includes computer usable program code. The computer usable program code, when executed by a processor, causes the processor to receive a request by a first user to access confidential data. The processor further receives login credentials for the first user and a location of the user as provided by a global positioning system (GPS). Based on the request, identification, and GPS of the first user, the processor determines a security classification and associated security level for the request. A request is made for information from second users associated with the security classification and associated security level. Based on the information received and a location of each second user, the processor determines whether or not access should be granted to the first user. The processor provides the first user with access to the confidential data based on the determination.

[0029] The non-transitory computer readable medium further includes that the processor notify the second users of the first user prior to requesting the information. [0030] Fig. 1 is an illustration of an example system 100 for granting access to confidential data, according to an example of principles described herein. The system 100 includes a non-transitory memory 102 that stores confidential data instructions 104 to perform operations that will ultimately grant access to confidential data to a user or users in a group. The system 100 further incudes a computer processor 106 whereby the confidential data instructions 104 stored are executed to perform operations. The confidential data instructions 104instruct that upon receipt of the login credentials by the first user and based on the request and identification of the first user, a determination is made as to a security classification for the request that is based on an associated level of security. A request is made for information from second users associated with the security classification and associated level of security. Based on the information received, it is determined whether or not access should be granted to the first user. Based on the determination, the first user is provided with access to the confidential data for as long as an active state of the second users is found.

[0031] An example of confidential data instructions 104 executed by the computer processor 106 may be seen in the flowchart 108 of Fig. 2. For purposes of discussion, the flowchart 108 will be discussed with respect to the diagram 109 shown in Fig. 3. According to the method 108, a request for confidential data 113 is received 110 from a first user 154. Login credentials 155 are also received 112 for the first user 154. Based on the request and identification of the first user 154, the system 100 determines 114 a security classification for the request. A security classification refers to the amount of security afforded to confidential data and may impact the number of, and which, users have access to that information. Examples of security classifications include confidential, secret, and top secret. While particular reference is made to a few security classifications, other security classifications may be implemented in accordance with the principles described herein.

[0032] Information 157-1 , -2, -3 is requested 116 from second users 156-1 , -2, -3 associated with the security classification. Based on the information 157-1 , -2, -3 received 118 from the second users 156-1 , -2, -3, it is determined whether or not access should be granted 120. If it is determined that access should be granted, then the first user 154 is provided 122 with access to the confidential data 113 from the system 100. With reference to Fig. 4, the information 157-1 , -2, -3 may include at least one of a password 139-4, -1 , -2, - 3, a facial biometric 143-4, -1 , -2, -3, encrypted data 146-4, -1 , -2, -3, a voice biometric 144-4, -1 , -2, -3, and a fingerprint 142-4, -1 , -2, -3. The information 157-1 , -2, -3 requested may further include a specific location 145-4, -1 , -2, 03 from a target device of the second users 156-1 , -2, -3.

[0033] The information 157-1 , -2, -3 received by the second users

156-1 , -2, -3 serves as a consent, or authorization, by the second users 156-1 , - 2, -3 to grant access to the first user 154. There may be a time period allocated for which second users 156-1 , -2, -3 may respond by providing the information

157-1 , -2, -3. Thus, a synchronous nature of information 157-1 , -2, -3 sharing is observed in order to grant access to the first user 154. If the information 157-1 , - 2, -3 is not received 118 from the second users 156-1 , -2, -3, then the system

100 may wait for another request 111 by the first user 154. Similarly, if information is not received by the second users, 156-1 , -2, -3 responsive to this second request, then the system 100 may again wait for another request 110 by the first user 154.

[0034] Note that the first user 154 may receive a status indication of second users 156-1 , -2, -3 during the authorization process. In an example, the first user 154 may see a list of the second users 156-1 , -2, -3, which second users 156-1 , -2, -3 are under notification, and which second users 156-1 , -2, -3 are logged in and have supplied the information 157-1 , -2, -3. Note that notifications may be sent to devices not registered to provide information. The target devices, or devices of the second users 156-1 , -2, -3 that are registered are the devices that supply the information.

[0035] Also, the first user 154 and second users 156-1 , -2, -3 may be notified about the request and which users 154, 156-1 , -2, -3 are providing information for the first time in a session. Note that second users 156-1 , -2, -3 may refuse a session. Even one second user 156-1 , -2, -3 that refuses the session may block the session for all other users. [0036] The second users 156-1 , -2, -3 may have access to the shared confidential data 113 once the information 157-1 , -2, -3 is verified. In an example, the second users 156-1 , -2, -3 and the first user 154 may have an active state in order for the second users 156-1 , -2, -3 to access the shared confidential data 113.

[0037] Fig. 4 depicts a diagram of a computing environment 111for granting access to confidential data, according to an example of principles described herein. The computing environment 111 includes a system 100 which contains confidential data 113 for access by a group that includes a first user 154 and second users 156-1 , -2, -3. The login credentials 155 provided by the first user 154 and the information 157-1 , -2, -3 requested by the second users 156-1 , -2, -3 may include at least one of a password 139-4, -1 , -2, -3, a facial biometric 143-4, -1 , -2, -3, encrypted data 146-4, -1 , -2, -3, a voice biometric 144-4, -1 , -2, -3, and a fingerprint 142-4, -1 , -2, -3. The information 157-1 , -2, -3 requested may further include a specific location 145-4, -1 , -2, 03 from a target device of the second users 156-1 , -2, -3 and/or first user 154.

[0038] Once the information 157-1 , -2, -3 is verified, the confidential data 113 is provided to the first user 154. The confidential data 113 may be encrypted data such that the confidential data is decrypted while the first user 154 has access and is then encrypted when the first user 154 has no access.

[0039] In the example shown, the first user 154 requests the confidential data, however, more than one user (e.g., second user 156-1 , -2, -3) may make a request for the confidential data. Moreover, the requests may be made at the same time or at different times. The confidential data 113 may be provided to the first user 154 as long as an active state of the second users 156-1 , -2, -3 is found. An active state is a state in which the second users 156-1 , -2, -3, remain logged in to their devices. Respective devices of the second users 156-1 , -2, -3 may include, for example, mobile devices 138-1 , -2, -3 or computing devices 137-1 , -2, -3 as shown. Other devices may include any device capable of providing the information 157-1 , -2, -3 requested. In an example, other devices include devices that may access the confidential data 113 by making a request as described above. [0040] At least one second user 156-1 , -2, -3 may be designated as an administrator which may have additional responsibilities. For example, the second user 156-1 may be the administrator. The responsibilities of the administrator 156-1 may include, for example, forming the group and defining which information is to be provided by the second user 156-1 , -2, -3to allow access to the first user 154. The user 156-1 as administrator may further provide extra information, such as a specific location 145-4 from a device 138-1 or 137-1 to the system 100. As described above, the specific location 145-4 may be within a particular region, city, or neighborhood.

[0041] The system 100 may be a cloud, a server with a data center on a cloud, a cloud service, a data center, or another environment that may be secured. In an example, the system 100 may be cloud-based where the data center is protected and maintains the data in encrypted form.

[0042] Confidential data 113 is stored in the system 100. Confidential data 113 may include highly sensitive information, financial records, personal information, trade secrets, information about projects under development, patents not submitted yet, stack of technologies used in researches, sketches, business projections, costs, marketing plans, customers, suppliers, designs, composites, pending political decisions, customer telemetry consolidation data, business projections, and marketing plans. While particular reference is made to certain confidential data 113, other forms of confidential data 113 may be protected by the system 100 described herein.

[0043] T urning to Fig. 5, an example of user groups, 125, 129, 133 having a respective security classification 124, 128, 132 is shown. Each security classification 124, 128, 132 is based on an associated level of security which includes different login credentials 155 and information 157-1 , -2, -3 provided by the second users to grant access to the confidential data 113. The following describes three example security classifications 124, 128, 132.

[0044] 1. CONFIDENTIAL 132: This classification level may represent a lowest classification level of confidential data. It may be defined as data that would damage the security if publicly disclosed without proper authorization. In an example, a company may use this classification level to maintain secure information from lower level employees and allow secure information to be shared internally with higher level employees.

[0045] 2. SECRET 128: This classification level may be an intermediate classification. Secret data or information may be information for which unauthorized disclosure is believed to be able to cause more significant damage than an unauthorized disclosure of information classified as confidential. An example of this type of data includes, for example, salaries in a company.

[0046] 3. TOP SECRET 124: This classification level may be a highest classification and may be data that, if disclosed without authorization, may cause particularly harmful grave damage, to a degree greater than confidential and secret information. In an example, this type of information may include employees’ personal information including address, phone number, and social security information. In another example, top secret information may include a list of customers and their personal information.

[0047] In the example shown in Fig. 5, the “CONFIDENTIAL” security classification 132 may dictate that users in the associated group133 register a strong password. The users in this group 133 may register a countersign that is used during the encrypting and decrypting process in upload and download activities of data. Users in this group 133 may register a biometric data. In an example, user location and device registration may not be implemented in this group 133.

[0048] A higher level, for example the “SECRET” security classification 128 may dictate that that users register a strong password. The users of this group 129 may register a countersign used during the encrypting and decrypting process in upload/download activities of data. Users of this group 129 may may register a biometric data from mobile and may register their devices to be used as a target device. In an example, the e-mail notification for user confirmation may be opened in the target device. Such an e-mail may provide a link which guides the users to complete the registration and collect device data. In an example, a user location is not implemented in this group 129. [0049] A highest level, the “TOP SECRET” security classification 124 may dictate that users register a strong password. Users of this group 125 may register a countersign used during the encrypting and decrypting process in upload and download activities of data. Users of this group 125 may register at least one biometric data, such as a fingerprint, a face biometric, or voice biometric, from a mobile device or other computing device. Furthermore, the biometric data of a voice recognition may dictate a secret phrase be used in order to guarantee that the voice and phrase are acceptable.

[0050] Users in the “TOP SECRET” group 125 may register their devices to be used as a target device such that an e-mail notification for user confirmation may be opened in target device. The e-mail may provide a link which guides the users to complete the registration and collect device data.

[0051] In an example, at least one user is designated as the administrator 126. The administrator 126 registers a specific location of the administrator 126 from a GPS on the target device of the administrator 126. That is, the system 100 verifies the location of the administrator 126 with the registered location prior to providing the first user 154 with access to the confidential data. In an example, an application in a mobile device may collect the location of the mobile device of the administrator 126. In another example, the application defines in a map where the administrator 126 may be located by the GPS when responding to the notification. The use of GPS or other location information reinforces security by incorporating information received from the device and not directly from the user. Note that the location may be a delimited region, city, or neighborhood.

[0052] Note that not every security classification may implement the location of the administrator 126. For example, as demonstrated above, just the high level of security, i.e., the “TOP SECRET” classification, implements the location of the administrator 126 as a prerequisite for confidential data 113 access. Note that not every security classification may have an administrator 126. In an example, at least one security classification has an administrator 126. In another example, every security classification has an administrator 126. In another example, each administrator 126 is unique relative to the other security classifications.

[0053] Accordingly, the system 100 and methods described herein provides additional security as data is accessed just when all users from the group are aware of the session. An example of a scenario for this type of security access is related to data which may not be shared with the general public or other individuals. The impact of usage of this data by unauthorized people may be undesirable. Accordingly, the system 100 and method incorporate readily available information (e.g., biometric recognition, GPS, cloud, cryptography, devices, etc.).

[0054] Fig. 6 depicts a non-transitory machine-readable storage medium 170 for providing burn-in sequencing, according to an example of the principles described herein. To achieve its desired functionality, the system 100 includes various hardware components. Specifically, the system 100 includes a processor and a machine-readable storage medium 170. The machine- readable storage medium 170 is communicatively coupled to the processor. The machine-readable storage medium 170 includes a number of instructions 172, 174, 176, 178, 180, 182 for performing a designated function. In some examples, the instructions may be machine code and/or script code.

[0055] The machine-readable storage medium 170 causes the processor to execute the designated function of the instructions 172, 174, 176, 178, 180, 182. The machine-readable storage medium 170 may store data, programs, instructions, or any other machine-readable data that may be utilized to operate the system 100. Machine-readable storage medium 170 may store machine readable instructions that the processor of the system 100 may process, or execute. The machine-readable storage medium 170 may be an electronic, magnetic, optical, or other physical storage device that contains or stores executable instructions. Machine-readable storage medium 170 may be, for example, Random-Access Memory (RAM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage device, an optical disc, etc. The machine-readable storage medium 170 may be a non-transitory machine-readable storage medium 170. [0056] Referring to Fig. 6, receive request instructions, when executed by the processor, causes the processor to receive a request by a first user for confidential data. Receive credentials instructions 174, when executed by the processor, causes the processor to receive login credentials by the first user. The login credentials may include a location of the user as provided by GPS. Determine classification instructions 176, when executed by the processor, causes the processor to determine a security classification and associated security level for the request based on the request, identification, and location. Request information instructions 178, when executed by the processor, causes the processor to request information from second users associated with the security classification and associated security level. Grant access instructions 180, when executed by the processor, causes the processor to determine whether or not access should be granted to the first user based on the information received and a location of each second user. Provide access instructions 182, when executed by the processor, causes the processor to provide the first user with access to the confidential data based on the determination.

[0057] The preceding description has been presented to illustrate and describe examples of the principles described. This description is not intended to be exhaustive or to limit these principles to any precise form disclosed. Many modifications and variations are possible in light of the above teaching.




 
Previous Patent: FLUID CONNECTION ASSEMBLY

Next Patent: MEDIA HOLDERS