小儿疝气挂什么科| 不讲武德什么意思| 球镜是什么意思| 子宫小是什么原因引起的| 高送转是什么意思| 术后病人吃什么营养恢复快| 男性睾丸一边大一边小是什么原因| 一切尽在不言中什么意思| 1988年是什么生肖| 用什么洗脸可以祛斑| 婴儿湿疹用什么| 思字属于五行属什么| 大便有酸味是什么原因| human是什么意思| magnesium是什么意思| 梦到老鼠是什么意思| 头晕吃什么可以缓解| 第二天叫什么日| 肚脐眼为什么会有臭味| 六月初五是什么日子| 头发长不长是什么原因怎么办| 抑郁症挂什么科室| 时迁是什么意思| 胃ct能检查出什么病| 老放屁吃什么药| 公立医院和私立医院有什么区别| 跖疣去医院挂什么科室| 长痘要忌口什么东西| 杂酱面用什么面| glu是什么氨基酸| 吃什么补肾最快最有效| 谷丙转氨酶偏低是什么意思| 海肠是什么动物| 与虎谋皮什么意思| 灌肠什么意思| pr医学上什么意思| 精气是什么意思| 蒲公英泡水喝有什么效果| 什么算高危性行为| 日语斯国一是什么意思| 多酚是什么| 湿气是什么原因引起的| 什么叫小微企业| 人血白蛋白适合什么人| 感冒是什么症状| 痰饮是什么意思| 天天射精对身体有什么危害| 苹果a1660是什么型号| 梦见蛇蛋是什么意思啊| 益字五行属什么| 阴虚阳亢是什么意思| 脚掌发麻是什么原因| 吃什么水果减肥最快减肚子| 孤僻是什么意思| 12月13日是什么纪念日| 阴吹是什么| 气郁症是什么症状| 入肉是什么意思| 刷存在感是什么意思| 得糖尿病的原因是什么| 半夏微凉是什么意思| infp是什么意思| 辰五行属性是什么| 胸口堵是什么原因| 钅读什么偏旁| 甲亢不能吃什么| 怕热的人是什么体质| 想的偏旁是什么| 背疼是什么原因| 经期吃什么补气血| 牙虫是什么样的图片| 吃什么补气血最快最好| 白芷泡水喝有什么功效| 图什么| 7月8日是什么星座| 甜蜜素是什么东西| 追剧是什么意思| 糖尿病筛查做什么检查| 关节炎有什么症状| 核磁共振是查什么的| 胃左边疼是什么原因| 什么是提肛运动| 歇斯底里什么意思| 羽毛球拍磅数是什么意思| 肚子痛去医院挂什么科| tu是什么意思| 为什么游戏| 智齿什么时候开始长| 什么是童话故事| 见血封喉什么意思| 朱代表什么生肖| 足跟疼痛用什么药| 拉姆藏语什么意思| 晕车为什么读第四声| 身上老是痒是什么原因| 什么是血友病| 任达华属什么生肖| 发烧白细胞高是什么原因| 六七是什么意思| 哭什么| 前庭大腺囊肿是什么原因引起的| 肝病吃什么药好得快| 唱反调是什么意思| 女人手指粗短是什么命| 政字五行属什么| 咳嗽有痰是什么原因| 日成是什么字| 平顶山为什么叫平顶山| 双是什么意思| 乙肝弱阳性是什么意思| 复方对乙酰氨基酚片是什么药| 地道战在河北什么地方| 一般炒什么菜放蚝油| 老虎菜是什么菜| dpo是什么意思| 为什么耳朵后面会臭| 60min是什么意思| 不撞南墙不回头是什么意思| 哂是什么意思| 劳改是什么意思| 决明子配什么喝最减肥| 什么风云| 汗臭味很重是什么原因引起的| 目眩是什么症状| 上日下立读什么| 肆无忌惮的意思是什么| 什么是假性近视| h什么意思| 大小脸是什么原因造成的| 刘邦为什么要杀张良| 花匠是什么意思| 冰冻三尺非一日之寒是什么意思| 糖类抗原125是什么指标| 什么是甲母痣| ntd是什么意思| hbcab阳性是什么意思| 口缘字一半念什么| 溢脂性皮炎用什么药| 商品下架是什么意思| 狼入虎口是什么意思| 七月份有什么节日| 尿酸偏高有什么危害| 叶赫那拉氏是什么旗| 什么来钱快| f4什么意思| 迅雷不及掩耳之势是什么意思| 枸杞泡茶有什么功效| 红糖不能和什么一起吃| 发蒙是什么意思| 沈阳有什么好玩的地方| 空腹血糖受损是什么意思| 傻狍子为什么叫傻狍子| 三月八号什么星座| 口臭口苦吃什么药最好| 十羊九不全是什么意思| 肠梗阻是什么意思| 本字五行属什么| 脾肾阴虚有什么症状| 结甲可能是什么意思| 下蛊是什么意思| 德五行属什么| 乳腺回声不均匀是什么意思| 年岁是什么意思| 溶菌酶是什么| cea检查是什么意思| 大便黑绿色是什么原因| 什么样的人做什么样的事| 烧心反酸水吃什么药| 胎儿双肾盂分离是什么意思| 5w是什么意思| 什么叫消融术治疗| 钉钉是什么| mir是什么检查| 牙齿发酸是什么原因| 舌头发红是什么原因| 磨牙挂什么科| 胃病吃什么药最好| 撇清关系是什么意思| 手脚发麻是什么原因| 黑京念什么| 手淫有什么坏处| 乳头瘤有什么症状| 一吃饭就吐是什么原因| 益母草什么时候喝最好| 乙肝表面抗原携带者什么意思| 八月十八号是什么星座| 师团长是什么级别| 炎性增殖灶是什么意思| 献血后吃什么| 月经提前半个月来是什么原因| 斯德哥尔摩综合征是什么| 什么叫负氧离子| 十月份出生的是什么星座| 吃什么容易流产| 护法是什么意思| 月经期间吃西瓜有什么影响| wilson是什么意思| 狼入虎口是什么意思| 人生是什么| 骨瘤是什么病| 炒米是什么米做的| 孩子嗓子疼吃什么药| 荸荠的读音是什么| 例假推迟是什么原因引起的| used是什么意思| 脊椎痛什么原因| 前置胎盘是什么原因引起的| 什么人不能吃苦瓜| 十万左右买什么车好| 检查幽门螺旋杆菌挂什么科| 皮肤真菌感染用什么药| 身体缺镁会有什么症状| 水可以加什么偏旁| xo是什么酒| 苏联什么时候解体| 魔芋长什么样子| 91年五行属什么| 缓解是什么意思| 为什么尿频| 生理盐水是什么东西| 吃什么食物降血压最快最好| 掉头发是缺什么维生素| 大圣归来2什么时候上映| 男人吃四环素治什么病| 爬灰什么意思| 男人阴虚吃什么药好| 七月份怀孕预产期是什么时候| 眉心发红是什么原因| 儿童包皮手术挂什么科| 中签是什么意思| 回归是什么意思| 肝着是什么意思| 喉咙里老是有痰是什么原因| 血压低说明什么| 什么球会自己长大| 练字用什么笔好| 天津卫的卫是什么意思| 纹绣是什么| 肝内小囊肿是什么意思| 梦见小孩是什么| 木薯粉是什么东西| 眼珠子发黄是什么原因| 小孩抽动症是什么引起的| 1974年是什么命| 熟络是什么意思| 健康是什么| 珀莱雅属于什么档次| 爱说梦话是什么原因| 尿囊素是什么| mri什么意思| 肝硬化有什么症状表现| 抬举是什么意思| 头疼想吐是什么原因引起的| 胰岛素是什么意思| 眩晕症有什么症状| 法国的国花是什么花| 想留不能留才最寂寞是什么歌| 宫颈液基细胞学检查是什么| 六月二十三号是什么星座| 青鱼又叫什么鱼| hpv阳性有什么症状| 九点到十点是什么时辰| 癫疯是什么原因引起| 海豹油有什么功效| 百度

2017最新机动车与非机动车发生交通事故赔偿标准

Dynamical dual permissions-based data capturing and logging Download PDF

Info

Publication number
US7788706B2
US7788706B2 US11/167,533 US16753305A US7788706B2 US 7788706 B2 US7788706 B2 US 7788706B2 US 16753305 A US16753305 A US 16753305A US 7788706 B2 US7788706 B2 US 7788706B2
Authority
US
United States
Prior art keywords
application data
permissions
logging
capturing
permitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US11/167,533
Other versions
US20060294431A1 (en
Inventor
Lauren L. Bader
Julia V. Myers
James F. Schenck
Kevin L. Scheiern
II William C. Wimer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/167,533 priority Critical patent/US7788706B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BADER, LAUREN L., MYERS, JULIA V., SCHEIERN, KEVIN L., SCHENCK, JAMES F., WIMER II, WILLIAM C.
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BADER, LAUREN L., MYERS, JULIA V., SCHEIEM, KEVIN I., SCHENCK, JAMES F., WIMER, II, WILLIAM C.
Publication of US20060294431A1 publication Critical patent/US20060294431A1/en
Priority to US12/871,797 priority patent/US8353014B2/en
Application granted granted Critical
Publication of US7788706B2 publication Critical patent/US7788706B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF THE FOURTH ASSIGNORS NAME PREVIOUSLY RECORDED AT REEL: 016815 FRAME: 0256. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: BADER, LAUREN L., MYERS, JULIA V., SCHEIERN, KEVIN L., SCHENCK, JAMES F., WIMER, WILLIAM C., II
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY?PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • the present invention relates to the field of application administration and more particularly to the field of data capturing and logging during application administration.
  • Administering a larger, distributed application often can involve the capture and logging of data produced in association with the operation of the application.
  • application administrators can collect the data in order to confirm the proper operation of the application, and to troubleshoot application execution problems.
  • the data collected by the administrator can be of a sensitive nature.
  • Mechanisms presently exist to secure access to sensitive data by limiting access to sensitive data to particular users or user classifications. However, these mechanisms are developed in conjunction with the application itself and without consideration for those who administer the application.
  • the determination of whether or not to capture and log application data can be based upon the data itself. Yet, in some applications it can be desirable to log data selectively based upon the user associated with the data. Also, changes to the desirability of logging data, when hard coded, is limited to decision making performed by the application developer and bears no relationship to the preferences of the user. Finally, hard coding the data logging function does not permit changes in the capturing and logging decision without also requiring a recoding of the application.
  • Embodiments of the present invention address deficiencies of the art in respect to application data logging and provide a novel and non-obvious method, system and computer program product for capturing and logging application data.
  • a method for capturing and logging application data can include consulting both administrative permissions for capturing and logging application data, and also user permissions for capturing and logging application data. Subsequently, application data can be captured and logged only if permitted by the administrative permissions and the user permissions. In this regard, it can be determined from either or both of the permissions whether capturing and logging of application data is permitted generally, and also a type or portion of the application data that is permitted to be captured and logged.
  • a data processing system for capturing and logging application data can include a data log configured to stored logged application data.
  • the system also can include a set of dual permissions comprising administrative permissions and user permissions specifying whether logging application data from an application is permitted.
  • the system can include data capturing and logging logic configured for coupling to each of the data log, an application, and the set of dual permission.
  • the data capturing and logging logic can include program code enabled to log captured application data from the application only if permitted by the set of dual permission.
  • FIG. 1 is a schematic illustration of a data processing system configured for dynamic dual-permissions based data capturing and logging;
  • FIG. 2 is a flow chart illustrating a process for dynamic dual-permissions based data capturing and logging.
  • Embodiments of the present invention provide a method, system and computer program product for dynamic dual-permissions based data capturing and logging.
  • data capturing and logging can be selectively performed for data based upon dynamically applied permissions specified both by an application administrator and an application user associated with the data. Specifically, initially it can be determined whether application data capturing and logging is permitted according to the preferences of the application administrator. Subsequently, only if application data capturing and logging is permitted by the administrator preferences, it can be determined whether privacy preferences for a user associated with the data permit the capturing and logging of associated data. If so, data associated with the user can be captured and logged.
  • FIG. 1 is a schematic illustration of a data processing system configured for dynamic dual-permissions based data capturing and logging.
  • the system can include an application 150 hosted within one or more host computing platforms 120 (only a single host computing platform shown for illustrative simplicity).
  • the application 150 can be a stand-alone application, or the application 150 can be a distributed application as shown in the illustration which can be accessed by one or more end users 110 over a data communications network 130 . In either circumstance, the application 150 can produce and manage application data stored within a data store of application data 160 .
  • Data capturing and logging logic 200 hosted within a host computing platform 140 can be communicatively coupled to the application 150 .
  • the data capturing and logging logic 200 can be coupled to the application 150 in a number of ways, for example from within the same, host operating environment, across different process address spaces in the same or different computing platforms, or through inter-process communications across the data communications network 130 as shown in the illustration.
  • the data capturing and logging logic 200 can be configured to selectively capture and log data 180 in a data log 170 for use in application administration according to dual permissions specified by administrated permissions 190 A and user permissions 190 B.
  • the data capturing and logging logic 200 can consult the administrative permissions 190 A to determine whether logging and capturing of the data 180 is permitted generally.
  • the administrative permissions 190 A further can specify what types of the data 180 are to be captured and logged and which types of the data 180 are not to be captured and logged.
  • the data capturing and logging logic 200 further can consult the user permissions 190 B for the users to determine whether logging and capturing of those portions of the data 180 associated with respective users is permitted.
  • the user permissions 190 B further can specify what types of the data 180 are to be captured and logged and which types of the 180 are not to be captured and logged.
  • FIG. 2 is a flow chart illustrating a process for dynamic dual-permissions based data capturing and logging.
  • a data capture request can be received to capture and log data for a coupled application.
  • the administrative permissions for data capturing and logging can be consulted to determine whether data capturing and logging is permitted, and further what portions or types of the application data can be captured and logged.
  • decision block 230 if the administrative permissions do not permit the capturing and logging of the data for the application, the process can end in block 300 . Otherwise, the process can continue through block 240 .
  • data for the application can be captured.
  • an associated user or user class can be determine for the captured data and in block 260 the user permissions for the user or user class can be retrieved.
  • decision block 270 it can be determined whether the user permissions allow for the logging and capturing of data associated with the user or user class.
  • the data capturing and logging process can continue through decision block 290 returning to block 240 until it is decided to no longer capture and log data.
  • the determination of whether to log captured data for a particular user can change dynamically and globally merely by modifying the user permissions, the administrative permissions, or both. No re-coding of the application will be required. Furthermore, the underlying application can change without impacting the capturing and logging process. Also, the dual nature of the permissions allows both the end users and the application administrator to control access to the logging of sensitive data. Finally, the dual permissions apply not to the data exclusively, but to the users of the data which is more closely aligned with the privacy interests addressed herein which can vary for the same application data from user to user.
  • Embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements.
  • the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, and the like.
  • the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
  • Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
  • a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
  • the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • I/O devices including but not limited to keyboards, displays, pointing devices, etc.
  • Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

Embodiments of the present invention address deficiencies of the art in respect to application data logging and provide a novel and non-obvious method, system and computer program product for capturing and logging application data. In an embodiment of the invention, a method for capturing and logging application data can include consulting both administrative permissions for capturing and logging application data, and also user permissions for capturing and logging application data. Subsequently, application data can be captured and logged only if permitted by the administrative permissions and the user permissions. In this regard, it can be determined from either or both of the permissions whether capturing and logging of application data is permitted generally, and also a type or portion of the application data that is permitted to be captured and logged.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to the field of application administration and more particularly to the field of data capturing and logging during application administration.
2. Description of the Related Art
Conventional computing applications range from miniscule compilations of logic which execute in a stand-alone environment, to globally distributed applications hosted across multiple, dispersed computing platforms. For smaller, contained applications, the administration of the application can be minimized and the responsibility for maintaining the application can rest with the end user in most circumstances. In contrast, for larger, distributed applications, the administration of the application can be a complex and time consuming task and, in consequence, the responsibility for maintaining the application can rest with one or more expert administrators.
Administering a larger, distributed application often can involve the capture and logging of data produced in association with the operation of the application. In this regard, application administrators can collect the data in order to confirm the proper operation of the application, and to troubleshoot application execution problems. Yet, in some circumstances, the data collected by the administrator can be of a sensitive nature. Mechanisms presently exist to secure access to sensitive data by limiting access to sensitive data to particular users or user classifications. However, these mechanisms are developed in conjunction with the application itself and without consideration for those who administer the application.
In the application setting, a more restrictive policy towards data access can be preferred to secure access to the data. In contrast, in the application administration setting, a more liberal policy towards data access can be preferred to so as to provide the maximum opportunity to assess the efficacy of the operation of the application. Thus, many have resorted to “hard coding” the capturing and logging of data for administrative purposes to circumvent the restrictive data access policies of the underlying application. Of course, to “hard code” data capturing and logging logic can inhibit the reusability of the code and can introduce maintenance difficulties for those maintaining the application administrative logic.
Importantly, by statically coding the logging and capturing function in an application, the determination of whether or not to capture and log application data can be based upon the data itself. Yet, in some applications it can be desirable to log data selectively based upon the user associated with the data. Also, changes to the desirability of logging data, when hard coded, is limited to decision making performed by the application developer and bears no relationship to the preferences of the user. Finally, hard coding the data logging function does not permit changes in the capturing and logging decision without also requiring a recoding of the application.
BRIEF SUMMARY OF THE INVENTION
Embodiments of the present invention address deficiencies of the art in respect to application data logging and provide a novel and non-obvious method, system and computer program product for capturing and logging application data. In an embodiment of the invention, a method for capturing and logging application data can include consulting both administrative permissions for capturing and logging application data, and also user permissions for capturing and logging application data. Subsequently, application data can be captured and logged only if permitted by the administrative permissions and the user permissions. In this regard, it can be determined from either or both of the permissions whether capturing and logging of application data is permitted generally, and also a type or portion of the application data that is permitted to be captured and logged.
In another embodiment, a data processing system for capturing and logging application data can include a data log configured to stored logged application data. The system also can include a set of dual permissions comprising administrative permissions and user permissions specifying whether logging application data from an application is permitted. Finally, the system can include data capturing and logging logic configured for coupling to each of the data log, an application, and the set of dual permission. The data capturing and logging logic can include program code enabled to log captured application data from the application only if permitted by the set of dual permission.
Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
The accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
FIG. 1 is a schematic illustration of a data processing system configured for dynamic dual-permissions based data capturing and logging; and,
FIG. 2 is a flow chart illustrating a process for dynamic dual-permissions based data capturing and logging.
DETAILED DESCRIPTION OF THE INVENTION
Embodiments of the present invention provide a method, system and computer program product for dynamic dual-permissions based data capturing and logging. In accordance with an embodiment of the present invention, data capturing and logging can be selectively performed for data based upon dynamically applied permissions specified both by an application administrator and an application user associated with the data. Specifically, initially it can be determined whether application data capturing and logging is permitted according to the preferences of the application administrator. Subsequently, only if application data capturing and logging is permitted by the administrator preferences, it can be determined whether privacy preferences for a user associated with the data permit the capturing and logging of associated data. If so, data associated with the user can be captured and logged.
In further illustration of an embodiment of the invention, FIG. 1 is a schematic illustration of a data processing system configured for dynamic dual-permissions based data capturing and logging. The system can include an application 150 hosted within one or more host computing platforms 120 (only a single host computing platform shown for illustrative simplicity). The application 150 can be a stand-alone application, or the application 150 can be a distributed application as shown in the illustration which can be accessed by one or more end users 110 over a data communications network 130. In either circumstance, the application 150 can produce and manage application data stored within a data store of application data 160.
Data capturing and logging logic 200 hosted within a host computing platform 140 can be communicatively coupled to the application 150. The data capturing and logging logic 200 can be coupled to the application 150 in a number of ways, for example from within the same, host operating environment, across different process address spaces in the same or different computing platforms, or through inter-process communications across the data communications network 130 as shown in the illustration. Regardless, the data capturing and logging logic 200 can be configured to selectively capture and log data 180 in a data log 170 for use in application administration according to dual permissions specified by administrated permissions 190A and user permissions 190B.
Specifically, the data capturing and logging logic 200 can consult the administrative permissions 190A to determine whether logging and capturing of the data 180 is permitted generally. Optionally, the administrative permissions 190A further can specify what types of the data 180 are to be captured and logged and which types of the data 180 are not to be captured and logged. The data capturing and logging logic 200 further can consult the user permissions 190B for the users to determine whether logging and capturing of those portions of the data 180 associated with respective users is permitted. Again, optionally, the user permissions 190B further can specify what types of the data 180 are to be captured and logged and which types of the 180 are not to be captured and logged.
In further illustration, FIG. 2 is a flow chart illustrating a process for dynamic dual-permissions based data capturing and logging. Beginning in block 210, a data capture request can be received to capture and log data for a coupled application. In block 220, the administrative permissions for data capturing and logging can be consulted to determine whether data capturing and logging is permitted, and further what portions or types of the application data can be captured and logged. In decision block 230, if the administrative permissions do not permit the capturing and logging of the data for the application, the process can end in block 300. Otherwise, the process can continue through block 240.
In block 240, data for the application can be captured. In block 250, an associated user or user class can be determine for the captured data and in block 260 the user permissions for the user or user class can be retrieved. In decision block 270, it can be determined whether the user permissions allow for the logging and capturing of data associated with the user or user class. Optionally, it further can be determined what portions of the data or what types of data can be captured and logged for the user and user class. If the captured data meets both criteria in decision block 270, in block 280 the application data (or a permitted portion) of the application data can be logged. The data capturing and logging process can continue through decision block 290 returning to block 240 until it is decided to no longer capture and log data.
The skilled artisan will recognize several resulting aspects of the foregoing methodology. First, the determination of whether to log captured data for a particular user (and what types or portions of application to log) can change dynamically and globally merely by modifying the user permissions, the administrative permissions, or both. No re-coding of the application will be required. Furthermore, the underlying application can change without impacting the capturing and logging process. Also, the dual nature of the permissions allows both the end users and the application administrator to control access to the logging of sensitive data. Finally, the dual permissions apply not to the data exclusively, but to the users of the data which is more closely aligned with the privacy interests addressed herein which can vary for the same application data from user to user.
Embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, and the like. Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk—read only memory (CD-ROM), compact disk—read/write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Claims (3)

1. A computer-implemented method for capturing and logging application data generated by an application, comprising:
consulting both administrative permissions for capturing and logging application data, and user permissions for capturing and logging application data, wherein the consulting includes
identifying from the administrative permissions a type of application data permitted to be captured and logged;
identifying from the administrative permissions a portion of application data permitted to be captured and logged;
identifying from the user permissions a type of application data permitted to be captured and logged;
identifying from the user permissions a portion of application data permitted to be captured and logged;
capturing and logging a first portion of application data having a first type, the capturing and logging permitted by both said administrative permissions and said user permissions based upon the first type of the first portion of application data; and
denying permission to capture and log a second portion of application data having a second type, the second type not permitted to be captured and logged by either the administrative permissions or the user permissions based upon the second type of the second portion of application data.
2. A data processing system for capturing and logging application data comprising:
a data log configured to store logged application data;
a memory having stored therein a set of dual permissions comprising administrative permissions and user permissions specifying whether logging application data from an application is permitted; and
at least one processor configured to perform the operations of
consulting both administrative permissions for capturing and logging application data, and user permissions for capturing and logging application data, wherein the consulting includes
identifying from the administrative permissions a type of application data permitted to be captured and logged;
identifying from the administrative permissions a portion of application data permitted to be captured and logged;
identifying from the user permissions a type of application data permitted to be captured and logged;
identifying from the user permissions a portion of application data permitted to be captured and logged;
capturing and logging a first portion of application data having a first type, the capturing and logging permitted by both said administrative permissions and said user permissions based upon the first type of the first portion of application data; and
denying permission to capture and log a second portion of application data having a second type, the second type not permitted to be captured and logged by either the administrative permissions or the user permissions based upon the second type of the second portion of application data.
3. A non-transitory computer-readable storage medium having stored therein computer usable program code for capturing and logging application data generated by an application, the computer usable program code, which when executed by a computer hardware device, causing the computer hardware device to perform the operations of:
consulting both administrative permissions for capturing and logging application data, and user permissions for capturing and logging application data, wherein the consulting includes
identifying from the administrative permissions a type of application data permitted to be captured and logged;
identifying from the administrative permissions a portion of application data permitted to be captured and logged;
identifying from the user permissions a type of application data permitted to be captured and logged;
identifying from the user permissions a portion of application data permitted to be captured and logged;
capturing and logging a first portion of application data having a first type, the capturing and logging permitted by both said administrative permissions and said user permissions based upon the first type of the first portion of application data; and
denying permission to capture and log a second portion of application data having a second type, the second type not permitted to be captured and logged by either the administrative permissions or the user permissions based upon the second type of the second portion of application data.
US11/167,533 2025-08-07 2025-08-07 Dynamical dual permissions-based data capturing and logging Active 2025-08-07 US7788706B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/167,533 US7788706B2 (en) 2025-08-07 2025-08-07 Dynamical dual permissions-based data capturing and logging
US12/871,797 US8353014B2 (en) 2025-08-07 2025-08-07 Dynamic dual permissions-based data capturing and logging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/167,533 US7788706B2 (en) 2025-08-07 2025-08-07 Dynamical dual permissions-based data capturing and logging

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/871,797 Continuation US8353014B2 (en) 2025-08-07 2025-08-07 Dynamic dual permissions-based data capturing and logging

Publications (2)

Publication Number Publication Date
US20060294431A1 US20060294431A1 (en) 2025-08-07
US7788706B2 true US7788706B2 (en) 2025-08-07

Family

ID=37569049

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/167,533 Active 2025-08-07 US7788706B2 (en) 2025-08-07 2025-08-07 Dynamical dual permissions-based data capturing and logging
US12/871,797 Expired - Fee Related US8353014B2 (en) 2025-08-07 2025-08-07 Dynamic dual permissions-based data capturing and logging

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/871,797 Expired - Fee Related US8353014B2 (en) 2025-08-07 2025-08-07 Dynamic dual permissions-based data capturing and logging

Country Status (1)

Country Link
US (2) US7788706B2 (en)

Families Citing this family (8)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US7464298B2 (en) * 2025-08-07 2025-08-07 International Business Machines Corporation Method, system, and computer program product for multi-domain component management
US8312323B2 (en) 2025-08-07 2025-08-07 Commvault Systems, Inc. Systems and methods for remote monitoring in a computer network and reporting a failed migration operation without accessing the data being moved
EP2209068A1 (en) * 2025-08-07 2025-08-07 Miyowa Method for auditing data from a computer application of a terminal
FR2941080A1 (en) * 2025-08-07 2025-08-07 Miyowa Computer application usage data auditing method for e.g. computing terminal, involves integrating audit instruction in component of framework, where instruction is activated only when component is used and included in component list
US9612885B1 (en) * 2025-08-07 2025-08-07 Ca, Inc. System and method for providing a transient and removable inflection point
US10360135B2 (en) 2025-08-07 2025-08-07 Microsoft Technology Licensing, Llc Privilege test and monitoring
CN108038231B (en) * 2025-08-07 2025-08-07 Oppo广东移动通信有限公司 Log processing method and device, terminal equipment and storage medium
US11329956B2 (en) 2025-08-07 2025-08-07 Bank Of America Corporation Scalable encryption framework using virtualization and adaptive sampling

Citations (26)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US5173939A (en) 2025-08-07 2025-08-07 Digital Equipment Corporation Access control subsystem and method for distributed computer system using compound principals
US6044466A (en) 2025-08-07 2025-08-07 International Business Machines Corp. Flexible and dynamic derivation of permissions
US20020016840A1 (en) 2025-08-07 2025-08-07 Shai Herzog Applying recursive policy for scoping of administration of policy based networking
US20020095414A1 (en) 2025-08-07 2025-08-07 General Electric Company Delegated administration of information in a database directory
US20020111816A1 (en) 2025-08-07 2025-08-07 Lortscher Frank D. System and method for managing consumer information
US20020138155A1 (en) * 2025-08-07 2025-08-07 Bristol Guy Scott Implantable medical device management system
US6470299B1 (en) 2025-08-07 2025-08-07 Hewlett-Packard Company Probabilistic privacy protection
US20030097594A1 (en) * 2025-08-07 2025-08-07 Alain Penders System and method for privacy protection in a service development and execution environment
US20030120601A1 (en) * 2025-08-07 2025-08-07 Secretseal Inc. Dynamic evaluation of access rights
US20040001573A1 (en) * 2025-08-07 2025-08-07 International Business Machines Corporation Method, apparatus and computer program product for authorizing recording of a message
US6751647B1 (en) * 2025-08-07 2025-08-07 Intel Corporation Method and apparatus for automated data exchange between a user computer and a provider computer using improved object-oriented programming components
US20050015674A1 (en) * 2025-08-07 2025-08-07 International Business Machines Corporation Method, apparatus, and program for converting, administering, and maintaining access control lists between differing filesystem types
US20050149452A1 (en) * 2025-08-07 2025-08-07 Clayton Gary E. Policy notice method and system
US6928291B2 (en) * 2025-08-07 2025-08-07 Openwave Systems Inc. Method and apparatus for dynamically controlling release of private information over a network from a wireless device
US20060031301A1 (en) * 2025-08-07 2025-08-07 Herz Frederick S M Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases
US20060041935A1 (en) * 2025-08-07 2025-08-07 Conley James W Methodology for configuring network firewall
US7013310B2 (en) * 2025-08-07 2025-08-07 Cashedge, Inc. Method and apparatus for retrieving and processing data
US20060075492A1 (en) * 2025-08-07 2025-08-07 Microsoft Corporation Access authorization with anomaly detection
US20060090202A1 (en) * 2025-08-07 2025-08-07 Institute For Information Industry Methods and systems for data authorization and mobile devices using the same
US20060155668A1 (en) * 2025-08-07 2025-08-07 Cerner Innovation, Inc. System and method for medical privacy management
US20060282878A1 (en) * 2025-08-07 2025-08-07 Stanley James C Expression of packet processing policies using file processing rules
US20070078677A1 (en) * 2025-08-07 2025-08-07 Intellirad Solutions Pty Ltd Controlling access to medical records
US7257835B2 (en) * 2025-08-07 2025-08-07 Microsoft Corporation Securely authorizing the performance of actions
US7269853B1 (en) * 2025-08-07 2025-08-07 Microsoft Corporation Privacy policy change notification
US7356840B1 (en) * 2025-08-07 2025-08-07 Microstrategy Incorporated Method and system for implementing security filters for reporting systems
US7356836B2 (en) * 2025-08-07 2025-08-07 Microsoft Corporation User controls for a computer

Patent Citations (26)

* Cited by examiner, ? Cited by third party
Publication number Priority date Publication date Assignee Title
US5173939A (en) 2025-08-07 2025-08-07 Digital Equipment Corporation Access control subsystem and method for distributed computer system using compound principals
US6044466A (en) 2025-08-07 2025-08-07 International Business Machines Corp. Flexible and dynamic derivation of permissions
US6751647B1 (en) * 2025-08-07 2025-08-07 Intel Corporation Method and apparatus for automated data exchange between a user computer and a provider computer using improved object-oriented programming components
US20050149452A1 (en) * 2025-08-07 2025-08-07 Clayton Gary E. Policy notice method and system
US20020016840A1 (en) 2025-08-07 2025-08-07 Shai Herzog Applying recursive policy for scoping of administration of policy based networking
US20020095414A1 (en) 2025-08-07 2025-08-07 General Electric Company Delegated administration of information in a database directory
US6470299B1 (en) 2025-08-07 2025-08-07 Hewlett-Packard Company Probabilistic privacy protection
US6928291B2 (en) * 2025-08-07 2025-08-07 Openwave Systems Inc. Method and apparatus for dynamically controlling release of private information over a network from a wireless device
US20020111816A1 (en) 2025-08-07 2025-08-07 Lortscher Frank D. System and method for managing consumer information
US20020138155A1 (en) * 2025-08-07 2025-08-07 Bristol Guy Scott Implantable medical device management system
US20030097594A1 (en) * 2025-08-07 2025-08-07 Alain Penders System and method for privacy protection in a service development and execution environment
US7356840B1 (en) * 2025-08-07 2025-08-07 Microstrategy Incorporated Method and system for implementing security filters for reporting systems
US20030120601A1 (en) * 2025-08-07 2025-08-07 Secretseal Inc. Dynamic evaluation of access rights
US7013310B2 (en) * 2025-08-07 2025-08-07 Cashedge, Inc. Method and apparatus for retrieving and processing data
US20040001573A1 (en) * 2025-08-07 2025-08-07 International Business Machines Corporation Method, apparatus and computer program product for authorizing recording of a message
US7356836B2 (en) * 2025-08-07 2025-08-07 Microsoft Corporation User controls for a computer
US20070078677A1 (en) * 2025-08-07 2025-08-07 Intellirad Solutions Pty Ltd Controlling access to medical records
US7257835B2 (en) * 2025-08-07 2025-08-07 Microsoft Corporation Securely authorizing the performance of actions
US20050015674A1 (en) * 2025-08-07 2025-08-07 International Business Machines Corporation Method, apparatus, and program for converting, administering, and maintaining access control lists between differing filesystem types
US20060031301A1 (en) * 2025-08-07 2025-08-07 Herz Frederick S M Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases
US7269853B1 (en) * 2025-08-07 2025-08-07 Microsoft Corporation Privacy policy change notification
US20060041935A1 (en) * 2025-08-07 2025-08-07 Conley James W Methodology for configuring network firewall
US20060075492A1 (en) * 2025-08-07 2025-08-07 Microsoft Corporation Access authorization with anomaly detection
US20060090202A1 (en) * 2025-08-07 2025-08-07 Institute For Information Industry Methods and systems for data authorization and mobile devices using the same
US20060155668A1 (en) * 2025-08-07 2025-08-07 Cerner Innovation, Inc. System and method for medical privacy management
US20060282878A1 (en) * 2025-08-07 2025-08-07 Stanley James C Expression of packet processing policies using file processing rules

Also Published As

Publication number Publication date
US20100325738A1 (en) 2025-08-07
US8353014B2 (en) 2025-08-07
US20060294431A1 (en) 2025-08-07

Similar Documents

Publication Publication Date Title
US8353014B2 (en) Dynamic dual permissions-based data capturing and logging
US10467426B1 (en) Methods and systems to manage data objects in a cloud computing environment
US11494518B1 (en) Method and apparatus for specifying policies for authorizing APIs
US20120167167A1 (en) Enabling granular discretionary access control for data stored in a cloud computing environment
US20090222879A1 (en) Super policy in information protection systems
RU2589852C2 (en) System and method for automatic regulation of rules for controlling applications
US20170005983A1 (en) Computer security architecture and related computing method
US20140189119A1 (en) Controlling Access to Resources on a Network
US10986095B2 (en) Systems and methods for controlling network access
US20070245348A1 (en) Virtual machine self-service restrictions
US20080172720A1 (en) Administering Access Permissions for Computer Resources
US7890756B2 (en) Verification system and method for accessing resources in a computing environment
US20080134320A1 (en) Method for automatic role activation
US9378384B2 (en) Secure endpoint file export in a business environment
US10623427B2 (en) Adaptive online data activity protection
CN110073335A (en) Management application program coexists and multiple user equipment management
US10628489B2 (en) Controlling access to one or more datasets of an operating system in use
US11405381B2 (en) Tag-based access permissions for cloud computing resources
US20250181715A1 (en) Abnormally permissive role definition detection systems
US20100185451A1 (en) Business-responsibility-centric identity management
US7950000B2 (en) Architecture that restricts permissions granted to a build process
KR102393146B1 (en) Policy application for multi-identity apps
US8909799B2 (en) File system firewall
US11063950B2 (en) Secure remote desktop session
US20140325605A1 (en) System for storage security of cloud server in cloud computing environment and method thereof

Legal Events

Date Code Title Description
AS Assignment 百度 同时,我省制定实施新一轮引才育才“千人计划”,创新设立优秀人才发展引导基金,创建打造高端人才服务示范基地,人才集聚效应明显增强,创新创业活力竞相迸发。

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BADER, LAUREN L.;MYERS, JULIA V.;SCHENCK, JAMES F.;AND OTHERS;REEL/FRAME:016548/0508

Effective date: 20050621

AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BADER, LAUREN L.;MYERS, JULIA V.;SCHENCK, JAMES F.;AND OTHERS;REEL/FRAME:016815/0256

Effective date: 20050621

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE SPELLING OF THE FOURTH ASSIGNORS NAME PREVIOUSLY RECORDED AT REEL: 016815 FRAME: 0256. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNORS:BADER, LAUREN L.;MYERS, JULIA V.;SCHENCK, JAMES F.;AND OTHERS;REEL/FRAME:036230/0241

Effective date: 20050621

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552)

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

为什么会长黄褐斑 早上醒来嘴苦是什么原因 女人40不惑什么意思 为什么突然长痣 内啡肽是什么
指甲盖凹陷是什么原因 避火图是什么 9.3号是什么星座 满是什么结构 孟字五行属什么
梦见自己准备结婚是什么意思 10月19是什么星座 ea是什么单位 1901年属什么生肖 百香果是什么季节的水果
百合与什么搭配最好 海绵体充血不足吃什么药 健康管理师是干什么的 嗜酸性粒细胞偏高是什么原因 佐匹克隆片是什么药
什么样的人招蚊子hcv9jop7ns2r.cn 澳大利亚说什么语1949doufunao.com 酸菜鱼放什么配菜好吃hcv8jop5ns1r.cn 头汗特别多是什么原因hcv8jop9ns4r.cn 什么的枣bysq.com
15度穿什么hcv9jop1ns3r.cn 平板有什么用处hcv7jop7ns2r.cn 职称有什么用huizhijixie.com 椰子水有什么好处hcv8jop7ns7r.cn 浮粉是什么原因引起的hcv9jop5ns3r.cn
西瓜不可以和什么同食hcv7jop9ns4r.cn 送人礼物送什么好hcv8jop9ns8r.cn 国际章是什么意思hcv8jop5ns2r.cn 胃胀胃不消化吃什么药zhiyanzhang.com 绿加红是什么颜色hcv9jop7ns0r.cn
高危性行为是什么意思96micro.com 酸奶坏了是什么味道hcv8jop5ns9r.cn 惨绿少年什么意思hcv7jop9ns9r.cn 种牙和假牙有什么区别hcv8jop5ns4r.cn 呈味核苷酸二钠是什么hcv9jop2ns2r.cn
百度