Claims
- 1. A method for enforcing policies regarding the behavior of objects within a system, comprising:
detecting an attempted interaction of objects; interrupting the attempted interaction; determining whether the interaction is permitted in accordance with respective licenses associated with the objects involved in the interaction; and if the interaction is permitted, dynamically generating a license governing the interaction in accordance with the respective licenses associated with the objects participating in the interaction.
- 2. The method claimed in claim 1, wherein said licenses associated with the objects involved in the interaction represent security policies applicable to the respective objects.
- 3. The method claimed in claim 1, wherein the respective licenses associated with the objects participating in the interaction and the license dynamically generated for governing the interaction are expressed using one of XrML and ODRL.
- 4. The method claimed in claim 1, wherein the attempted interaction is accessing of a document at a device by a user,
wherein the document, the device and the user are objects participating in the attempted interaction, and wherein a license governing the accessing of the document is dynamically generated based on respective licenses associated with the document, the user and the device.
- 5. The method claimed in claim 1, wherein the attempted interaction is an exchange of an information asset between users at respective devices,
wherein the users, the respective devices and the information asset are objects participating in the attempted interaction, and wherein the license governing the exchange of the information asset is dynamically generated based on respective licenses associated with the users, the devices and the information asset.
- 6. The method claimed in claim 1, further comprising:
encapsulating the license governing the exchange of the information asset with an instance of the information asset to form an encapsulated information asset; and exchanging the encapsulated information asset between the users.
- 7. The method claimed in claim 6, wherein the information asset comprises an electronic document.
- 8. The method claimed in claim 6, wherein the information asset comprises an email message.
- 9. The method claimed in claim 6, wherein the information asset comprises at least one of video data and audio data.
- 10. The method claimed in claim 6, wherein the information asset is real time data.
- 11. The method claimed in claim 10, wherein the real time data is one of a data stream and buffered data.
- 12. The method claimed in claim 6, wherein the information asset is exchanged in accordance with the SIP protocol, thereby incorporating enforcement of policies with SIP message exchange.
- 13. The method claimed in claim 1, wherein each of the objects is one of a user, a device, a process and an information asset.
- 14. A device for providing user access to information assets, the device comprising an agent for enforcing policies regulating the behavior of objects including the user, the device and information assets accessed by the device, the agent performing processing comprising:
detecting an attempt by the user to interact with an information asset using the device; interrupting the attempted interaction; obtaining a dynamically generated a license governing the attempted interaction in accordance with respective licenses associated with the device, and the user and the information asset; and regulating the interaction in accordance with the dynamically generated license.
- 15. The device claimed in claim 14, wherein the dynamically generated license is obtained by dynamically generating the license locally at the programmable device.
- 16. The device claimed in claim 14, wherein the dynamically generated license is obtained by:
informing a server of identities of the user, the device and the information asset; and receiving the dynamically generated license from the server.
- 17. The device claimed in claim 14, wherein the device is a computing device.
- 18. The device claimed in claim 17, wherein the information asset comprises an electronic document.
- 19. The device claimed in claim 17, wherein the information asset is real time data.
- 20. The device claimed in claim 19, wherein the real time data is one of a data stream and buffered data.
- 21. The device claimed in claim 17, wherein the information asset comprises a data file.
- 22. The device claimed in claim 17, wherein the information asset comprises at least one of an audio data stream and a video data stream.
- 23. The device claimed in claim 17, wherein the information asset comprises an email message.
- 24. The device claimed in claim 14, wherein the device is a mobile communication device.
- 25. A device for enforcing policies regarding the behavior of objects within a system, the device comprising an agent performing processing comprising dynamically generating a license governing an attempted interaction of objects of the system in accordance with grants contained in respective licenses associated with the respective objects participating in the attempted interaction.
- 26. A programmable device comprising an agent for providing a context-specific determination of the availability of an object within a system for an interaction with other objects, the agent performing processing comprising:
identifying an interaction for which an object's availability is to be determined; confirming the presence of the object within the system; confirming the presence of additional objects within the system that are required to facilitate the interaction; and analyzing respective licenses associated with each of the object and the respective additional objects to determine whether the interaction is permitted.
- 27. The device claimed in claim 26, wherein, if the interaction is permitted, the object is indicated to a user as being available for said interaction.
- 28. The device claimed in claim 27, wherein said object is indicated as being available by display of an icon to a user.
- 29. The device claimed in claim 26, wherein the interaction for which the object's availability is to be determined is identified in accordance with a license associated with an object requiring the interaction.
- 30. The device claimed in claim 26, wherein the presence of the object within the system is confirmed from presence information stored in a proxy server database.
- 31. The device claimed in claim 26, wherein the presence of additional objects within the system that are required to facilitate the interaction is confirmed from presence information for said objects stored in a proxy server database.
- 32. The device claimed in claim 31, wherein the presence of additional objects within the system that are required to facilitate the interaction is further confirmed from attribute information for said objects stored in a proxy server database.
- 33. The device claimed in claim 26, wherein the interaction for which an object's availability is to be determined is a voice communication to a user,
wherein confirming the presence of the object within the system comprises determining that the user is present in the system, and wherein confirming the presence of additional objects within the system comprises determining that devices and connections required to establish a voice communication with the user are present in the system.
- 34. The device claimed in claim 26, wherein the interaction for which an object's availability is to be determined is access to a data file,
wherein confirming the presence of the object within the system comprises determining that the data file is present in the system, and wherein confirming the presence of additional objects within the system comprises determining that devices and connections required to access the data file are present in the system.
- 35. The device claimed in claim 26, wherein the interaction for which an object's availability is to be determined is a voice communication with a user to approve changes made to a data file,
wherein confirming the presence of the object within the system comprises determining that the user is present in the system, and wherein confirming the presence of additional objects within the system comprises determining that devices and connections required to establish a voice communication with the user are present in the system and that devices and connections required to enable the user to view the data file are present in the system.
- 36. The device claimed in claim 26, wherein said processing further comprises dynamically generating a license governing the interaction in accordance with the respective licenses associated with objects participating in the interaction.
- 37. A method for providing a context-specific determination of the availability of an object within a system for an interaction with other objects, comprising:
identifying an interaction for which an object's availability is to be determined; confirming the presence of the object within the system; confirming the presence of additional objects within the system that are required to facilitate the interaction; and analyzing respective licenses associated with each of the object and the respective additional objects to determine whether the interaction is permitted.
- 38. The method claimed in claim 37, wherein said processing further comprises dynamically generating a license governing the interaction in accordance with the respective licenses associated with objects participating in the interaction.
RELATED APPLICATIONS
[0001] This application claims priority under 35 USC §119(e) from U.S. provisional application No. 60/347,124 filed 9 January 2002, U.S. provisional application No. 60/347,125 filed 9 January 2002, and U.S. provisional application No. 60/387,737 filed 11 June 2002, the entirety of each of which is incorporated herein by reference.
Provisional Applications (3)
|
Number |
Date |
Country |
|
60347124 |
Jan 2002 |
US |
|
60347125 |
Jan 2002 |
US |
|
60387737 |
Jun 2002 |
US |