US 12,379,922 B2
Software and/or computing hardware development security through permission profile assessment of a retrieval request for a design dependency tree based on a unique identifier such as an IP address
Vishal Moondhra, San Jose, CA (US); Fergus Slorach, Auckland (NZ); and Peter Theunis, Walnut Creek, CA (US)
Assigned to Methodics, Inc.
Filed by Methodics, Inc., San Francisco, CA (US)
Filed on Apr. 5, 2023, as Appl. No. 18/131,088.
Application 18/131,088 is a continuation of application No. 17/524,704, filed on Nov. 11, 2021, granted, now 11,650,813.
Application 17/524,704 is a continuation of application No. 16/995,711, filed on Aug. 17, 2020, granted, now 11,200,050, issued on Dec. 14, 2021.
Application 16/995,711 is a continuation of application No. 16/403,571, filed on May 5, 2019, granted, now 10,782,962, issued on Sep. 22, 2020.
Claims priority of provisional application 62/667,546, filed on May 6, 2018.
Prior Publication US 2023/0244477 A1, Aug. 3, 2023
Int. Cl. G06F 9/44 (2018.01); G06F 8/41 (2018.01); G06F 8/71 (2018.01); G06F 16/901 (2019.01); G06F 16/903 (2019.01)
CPC G06F 8/71 (2013.01) [G06F 8/433 (2013.01); G06F 16/9027 (2019.01); G06F 16/903 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A method for software and computing hardware development security, the method comprising:
receiving a request from a client device for retrieval of a dependency tree of a version of a component, the request comprising an IP address associated with a profile associated with the client device generating the request and the request further comprising a unique identifier of the version of the component as a root version of the dependency tree,
wherein the profile is at least one of a user profile and a group profile;
validating an asserted identity of the client device by querying the profile;
extracting a permission profile associated with the profile;
following a first dependency reference stored in a computer memory from the root version to a version of a first sub-component of the component;
following a second dependency reference to a version of a second sub-component of the component;
determining the version of the first sub-component of the component has a positive authorization status for read access through a database association between a unique identifier of the version of the first sub-component and the IP address;
determining the version of the second sub-component of the component has a negative authorization status for read access through a database association between the unique identifier of the second sub-component and the IP address;
assembling a restricted tree data stored in a non-transitory computer readable memory comprising the unique identifier of the version of the component and the unique identifier of the version of the first sub-component having the positive authorization status;
returning the restricted tree data comprising the unique identifier of the root version and the unique identifier of the version of the first sub-component;
retrieving one or more workfiles associated with the restricted tree data from a file repository; and
returning the one or more workfiles to the client device for assembly of a restricted instance of a design workspace.