The present invention relates generally to the field of access control management and more specifically to access control to sensitive data records.
Organizations collect and generate large amounts of data that can be used by many different parties for various purposes. Hospitals may generate medical records that could potentially be used by insurance companies and other entities. Part or all of the data may be sensitive and may require that the information be shared only as necessary. However, it is oftentimes difficult to determine what kinds of medical information are necessary to an entity in different scenarios. In particular, in an emergency, exceptions on information access may need to be made.
One aspect of the invention includes a method for access control. The method includes retrieving a list of accesses to data by a plurality of users for a certain purpose during a specified period of time; deriving access patterns based on said accesses; storing the derived access patterns; computing a risk score for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose; storing the risk scores; creating an aggregated total risk score for each of the plurality of users based on each respective user's computed risk score in a specified number of recent periods of time; determining a risk tolerance threshold based on the aggregated total risk score for each of the plurality of users; and if the aggregated total risk score for any of the plurality of users exceeds a risk-tolerance threshold, issuing a warning.
Another aspect of the invention includes a method for access control. The method includes retrieving a list of accesses of data by a plurality of users; deriving patterns of accessing the data by each of the plurality of users; storing the derived access patterns; allowing a quota specified as a limited number of accesses to the data by each of the plurality of users based on all of the plurality of users' risk scores; computing a risk score for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose; updating a remaining balance of allowed accesses after each access of the data by each of the plurality of users, or after a number of accesses of the data by each of the plurality of users within a specified period of time; and if the remaining balance is negative, denying future access requests to the respective user.
Another aspect of the invention includes a computer program product for access control. The computer program product includes a computer program product including a computer readable storage medium having computer readable code embodied therewith, the computer readable program code comprising computer readable program code configured to retrieve a list of accesses of data by a plurality of users; computer readable program code configured to derive patterns of accessing the data by each of the plurality of users; computer readable program code configured to store the derived access patterns; computer readable program code configured to allow a quota specified as a limited number of accesses to the data by each of the plurality of users based on all of the plurality of users' risk scores; computer readable program code configured to compute a risk score for each of the plurality of users based on each of the plurality of users' need to access the data for said certain purpose; computer readable program code configured to update a remaining balance of allowed accesses after each access of the data by each of the plurality of users, or after a number of accesses of the data by each of the plurality of users within a specified period of time; and computer readable program code configured to, if the remaining balance is negative, deny future access requests to the respective user.
Another aspect of the invention includes a computer program product for access control. The computer program product includes a computer program product including a computer readable storage medium having computer readable code embodied therewith, the computer readable program code comprising computer readable program code configured to derive a first pattern of accessing specified resources by a plurality of users for a certain purpose; computer readable program code configured to derive a second pattern of assessing the specified resources by a single user for the certain purpose; computer readable program code configured to measure a first entropy comprising a probability of an occurrence of the first pattern; computer readable program code configured to measure a second entropy comprising a probability of an occurrence of the second pattern; computer readable program code that equates information gain with the second entropy subtracted by the first entropy; and computer readable program code configured to compute a risk score for one of the users based on the information gain.
The above and below advantages and features are of representative embodiments only, and are not exhaustive and/or exclusive. They are presented to assist in understanding the invention. It should be understood that they are not to be considered limitations on the invention as defined by the claims, or limitations on equivalents to the claims. Additional features and advantages of the invention will become apparent in the following description, from the drawings, and from the claims. These and other features, aspects and advantages of the present invention will become better understood with reference to the following drawings, description and claims.
The present invention incorporates a risk-adaptive access control solution in ways not heretofore available including dynamic evaluation of a person's risk for accessing sensitive information, such as assessing medical records.
A user may utilize the invention by operating the user interface 130 with the keyboard and mouse 120. The user may utilize the system 100 by inputting data and instructions from the user interface 130 for processing by the access control engine 150. The access control engine may be processed by a computer with a computer processor 140. The user interface 130 and the access control engine 150 may be stored in computer memory, for example, random access memory 160 and on a hard disk 170. The user may also print operations from the user interface 130 on the printer 180.
As shown in
As further described in
As shown in
As shown in
As further shown in
As shown in
As shown in
As further shown in
As further shown in
As an example, users may determine their information needs for accessing records, without the use of an administrator. An access request may include at least an identity of a requestor, purpose of the request, label of a target resource, and a timestamp. The access request may be stored and maintained on a computer storage medium. A purpose of the access request may be automatically calculated from the context of the access request, and user role in the access request. As an example, a higher risk score may be given to accessing specified resources within a specified time period, than to accessing the specified resources outside the specified time period.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an”, and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the invention. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable media having computer readable program code embodied thereon.
Any combination of one or more computer readable media may be utilized. A computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of computer readable storage media would include an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
It should be understood, of course, that the foregoing relates to exemplary embodiments of the invention and that modifications may be made without departing from the spirit and scope of the invention as set forth in the following claims.
The present continuation application claims benefit of U.S. application Ser. No. 13/182,317, filed Jul. 13, 2011, which application is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 13182317 | Jul 2011 | US |
Child | 13593331 | US |