System and methods for providing multi-level security in a network at the application level
First Claim
1. A system for securing software applications, comprising:
- an application programming interface for providing access to the applications; and
a database containing authorizations granting each user access to selected applications, selected application screens, and selected fields within application screens, the application programming interface being configured such that a security software application prevents a user from gaining access to an application, screen, or field unless authorization has previously been given.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are described for providing multi-level security for a software application. In one system, an application programming interface provides access to secured software applications. A database stores authorizations granting each user access to selected applications, selected application screens, and selected fields within application screens. The application programming interface is configured such that a security software application prevents a user from gaining access to an application, screen, or field unless authorization has previously been given. A further system provides for the assignment of privileges to users of the application. These privileges define the specific functions that a user is allowed to perform with respect to an authorized application, screen, or field.
42 Citations
20 Claims
-
1. A system for securing software applications, comprising:
-
an application programming interface for providing access to the applications; and
a database containing authorizations granting each user access to selected applications, selected application screens, and selected fields within application screens, the application programming interface being configured such that a security software application prevents a user from gaining access to an application, screen, or field unless authorization has previously been given. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20)
-
-
13. A method of securing a software application, comprising the following steps:
-
assigning a unique user identifier to each user of the application;
assigning a unique application identifier to the application;
assigning a unique screen identifier to each application screen;
assigning a unique field identifier to each field in each application screen;
granting authorization to a user to access the application by attaching the application identifier to the user identifier;
granting authorization to a user to access an application screen by attaching the screen identifier to the user identifier;
granting authorization to a user to access a field in an application screen by attaching the field identifier to the user identifier; and
granting a request by a user to access an application, screen, or field only when it is determined that the user has been authorized to access the application, screen or field.
-
Specification