US 11,941,134 B2
Data access control systems and methods
Daniel Joseph Sturtevant, Cambridge, MA (US); Christopher Lalancette, Ayer, MA (US); Michael Nathan Lack, Arlington, VA (US); and Paul B. Schneck, Potomac, MD (US)
Assigned to INTELLECTUAL VENTURES II LLC, Wilmington, DE (US)
Filed by Intellectual Ventures II LLC, Wilmington, DE (US)
Filed on Sep. 19, 2022, as Appl. No. 17/948,112.
Application 17/948,112 is a continuation of application No. 16/816,032, filed on Mar. 11, 2020, granted, now 11,449,622.
Application 16/816,032 is a continuation of application No. 16/102,573, filed on Aug. 13, 2018, granted, now 10,599,859, issued on Mar. 24, 2020.
Application 16/102,573 is a continuation of application No. 15/656,966, filed on Jul. 21, 2017, granted, now 10,049,225, issued on Aug. 14, 2018.
Application 15/656,966 is a continuation of application No. 14/923,344, filed on Oct. 26, 2015, granted, now 9,740,872, issued on Aug. 22, 2017.
Application 14/923,344 is a continuation of application No. 14/307,394, filed on Jun. 17, 2014, granted, now 9,171,176, issued on Oct. 27, 2015.
Application 14/307,394 is a continuation of application No. 11/756,824, filed on Jun. 1, 2007, granted, now 8,800,008, issued on Aug. 5, 2014.
Claims priority of provisional application 60/803,683, filed on Jun. 1, 2006.
Prior Publication US 2023/0082746 A1, Mar. 16, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 21/00 (2013.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); G06F 21/85 (2013.01); H04L 9/40 (2022.01)
CPC G06F 21/62 (2013.01) [G06F 21/31 (2013.01); G06F 21/604 (2013.01); G06F 21/606 (2013.01); G06F 21/6209 (2013.01); G06F 21/6218 (2013.01); G06F 21/85 (2013.01); H04L 63/0807 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for controlling access to protected content or data, the method comprising:
receiving, at a computer device from a remote user device, a request to access the protected content or data, wherein the request comprises—
credentials associated with the remote user device and a user, the credentials including a user identifier associated with the user of the remote user device and a network resource identifier; and
an indication of an electronic ticket granted to the user, wherein the electronic ticket is separate from the credentials, and wherein the electronic ticket defines access control rules, the access control rules including a time range rule and at least one of a network resource rule or a user identifier rule;
comparing, at the computer device, as defined by the access control rules, the access control rules with (a) a time associated with the received request, and (b) the user identifier from the credentials and/or the network resource identifier from the credentials; and
determining, at the computer device, whether the request to access the protected content or data should be granted based on a result of the comparing,
wherein—
when it is determined that the request should be granted, enabling access to the protected content or data, and
when it is determined that the request should not be granted, denying access to the protected content or data.