| CPC G06N 5/022 (2013.01) [G06F 16/212 (2019.01); G06F 16/288 (2019.01); G06F 30/20 (2020.01); G06N 5/027 (2013.01); G06Q 10/00 (2013.01); G06Q 10/067 (2013.01); G06F 9/541 (2013.01)] | 24 Claims |

|
1. A method of securing data in a computer network, the method comprising:
receiving a request for a file-directed action, the request including an identifier of a user associated with the request, an identifier of a file for the file-directed action, and at least one indication of a mode of access of the file;
determining a process-type entity for computer executable action code representing the file-directed action based on the at least one indication of the mode of access of the file;
determining a data-type entity representing the file based on the identifier of the file;
generating a mediated covenant of association among a user-type entity representing the user based on the identifier of the user and the process-type entity representing the file-directed action, the covenant produced by node-by-node informatic convolution of a hierarchy of informational nodes present in profiles and in ancillary data of each of the user-type entity and the process-type entity, wherein the covenant expresses settings for executing the action code on behalf of the user;
producing a computer security event-specific computing object for constraining the file-directed action, the constraining based at least in part on the settings expressed by the covenant and a set of file access constraints from a profile of the data-type entity, wherein the profile of the data-type entity is decrypted and the set of file access constraints are identified in the decrypted profile based on the at least one indication of the mode of access of the file; and
facilitating an instance of access by the user to the file via the action code for a set of privileges that are consistent among the settings expressed by the covenant and the set of file access constraints, wherein constraints on execution of the action code are enforceable based on the computer security event-specific computing object.
|