Internal security system for a relational database system
First Claim
Patent Images
1. A internal security method for a relational database system, comprising the steps of:
- (a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) creating at least one relational access table with each system user having at least one record in the relational access table that is keyed to that system user'"'"'s access to the restricted data information that was determined at step (b); and
(d) each system user accessing restricted data information stored in the system databases according to the relational access table created at step (c).
10 Assignments
0 Petitions
Accused Products
Abstract
An internal security method for use with a relational database system is disclosed. The method is incorporated into a database system such that there is no need for security coding be layered on top of the system application software to prevent unauthorized access to restricted database information. The method of the present invention includes at least two embodiments and at least one of the embodiments has a “down the tree view” structure.
64 Citations
27 Claims
-
1. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) creating at least one relational access table with each system user having at least one record in the relational access table that is keyed to that system user'"'"'s access to the restricted data information that was determined at step (b); and
(d) each system user accessing restricted data information stored in the system databases according to the relational access table created at step (c). - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) determining the hierarchical level of access for each system user with regard to the restricted data information;
(d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that is a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access;
(e) creating at least one relational access table for controlling the first and second system users'"'"' access to restricted data information such that the first system user will have one or more records in the relational access table that is keyed to the first system user'"'"'s access to restricted data information that is determined at step (b) joined with the second system user'"'"'s access to restricted data infornmation that is determined at step (b), and the second system user will have one or more records in the relational access table that is keyed to the second system user'"'"'s access to restricted data information that is determined at step (b); and
(f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at step (e). - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) determining the hierarchical level of access for each system user with regard to the restricted data information;
(d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that includes other than a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access;
(e) creating at least one relational access table for controlling the first and second system users'"'"' access to restricted data information such that the first system user will have one or more records in the relational access table that is keyed to the first system user'"'"'s access to restricted data information that is determined at step (b) joined with the second system user'"'"'s access to restricted data infornmation that is determined at step (b), and the second system user will have one or more records in the relational access table that is keyed to the second system user'"'"'s access to restricted data information that is determined at step (b); and
(f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at steps (e). - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) determining the hierarchical level of access for each system user with regard to the restricted data information;
(d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that is a subset and includes other than a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access;
(e) creating at least one relational access table for controlling the first and second system users'"'"' access to restricted data information such that the first system user will have one or more records in the relational access table that is keyed to the first system user'"'"'s access to restricted data information that is determined at step (b) joined with the second system user'"'"'s access to restricted data infornmation that is determined at step (b), and the second system user will have one or more records in the relational access table that is keyed to the second system user'"'"'s access to restricted data information that is determined at step (b); and
(f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at steps (e). - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification