首页>
外国专利>
Information security profile and policy system
Information security profile and policy system
展开▼
机译:信息安全概况和政策体系
展开▼
页面导航
摘要
著录项
相似文献
摘要
A method for providing access to protected information comprises the steps of defining a security profile and policy for each item of protected information, defining a security access level for each potentially valid requester of the information, positively identifying a requester as a valid requester, validating a valid requester's security access profile with the security level of the protected information, and implementing the security policy for the protected information, so that a positively identified valid requester is provided with the appropriate access, while requests made by requesters lacking positive identification or the appropriate security level are treated in accordance with the security policy therefore. Pseudo identifiers may be used to request information, which are treated as lists of tasks rather than addresses. When an unauthorised requester is identified, substitute information may be provided so that they are not aware that their unauthorised status has been detected. A client identification key may be used, which may include configuration information of the client computer. Temporary files may be created for transmitting protected information to the client.
展开▼