US 11,880,482 B2
Secure smart containers for controlling access to data
Arielle Tovah Orazio, Wood-Ridge, NJ (US); Matthias Seul, Pleasant Hill, CA (US); Christopher Pepin, New Fairfield, CT (US); and Lloyd Wellington Mascarenhas, White Plains, NY (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Dec. 10, 2020, as Appl. No. 17/117,457.
Prior Publication US 2022/0188445 A1, Jun. 16, 2022
Int. Cl. H04L 29/06 (2006.01); G06F 21/62 (2013.01); G06F 21/60 (2013.01); G06F 21/31 (2013.01); G06F 9/455 (2018.01)
CPC G06F 21/6227 (2013.01) [G06F 9/45558 (2013.01); G06F 21/31 (2013.01); G06F 21/602 (2013.01); G06F 21/604 (2013.01); G06F 2009/45587 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A computer-implemented method for controlling access to a secure container comprising:
receiving, at an endpoint device, an image file;
instantiating, at the endpoint device of a user, a secure container that is based on the image file, wherein the secure container includes encrypted data corresponding to a plurality of users including the user and an enforcement engine, and wherein the encrypted data is encrypted such that different users can access different portions of data;
authenticating an access request to the secure container by verifying credentials of the user;
in response to verifying the credentials of the user, granting access to data that the user is authorized to access;
controlling access to the data, using the enforcement engine that is stored in the secure container, by decrypting and enabling access to a portion of the data that is also stored in the secure container, wherein additional portions of the data are decrypted and made accessible based on user behavior, and wherein each additional portion of the data is provided by providing instructions to the user to close a file comprising the portion of data, in response to the user closing the file, overwriting the file with an additional portion of data, providing instructions to the user to re-open the file, and in response to the user re-opening the file, providing the additional portion of data to the user;
receiving one or more edits by the user to the data that the user is authorized to access;
providing a modified image file including the one or more edits by the user; and
transmitting the modified image file to a device of an additional user who has different access permissions to the data as compared to the user.