System and method for securely accessing a database from a remote location
First Claim
1. A system for preventing unauthorized access of database systems, comprising:
- a database configured to store data and to retrieve portions of said data in response to queries; and
a server configured to store a plurality of coded expressions and to receive a coded expression transmitted from a client in communication with said server, said server configured to respectively associate each of said stored expressions with a different query, said server configured to correlate said received expression with one of said stored expressions and to submit, to said database and in response to said received expression, the query associated with said one stored expression, said server further configured to transmit, to said client, a portion of said data retrieved by said database in response to said submitted query.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure client/server system allows remote access to a database system without allowing unauthorized users to access data stored within the database system. A server receives a request for data from a client located at a remote location. The server translates the request for data into an appropriate query or queries. The queries are used by the server to retrieve data from databases associated with the server. If the requested data resides in a plurality of databases that utilize different protocols, the server submits a plurality of queries which are respectively compatible with the databases. Furthermore, if some of the information requested by the request for data is located in a remote database, the server creates a second request for data and transmits the second request for data to a remote server associated with the appropriate database. The remote server translates the second request for data into a second query and retrieves the requested data from the remote server with the second query. The remote server then transmits the data retrieved from the remote database to the server that originally received the request for data from the client. The original server assimilates all of the retrieved data and submits the data in encrypted form to the client.
136 Citations
12 Claims
-
1. A system for preventing unauthorized access of database systems, comprising:
-
a database configured to store data and to retrieve portions of said data in response to queries; and
a server configured to store a plurality of coded expressions and to receive a coded expression transmitted from a client in communication with said server, said server configured to respectively associate each of said stored expressions with a different query, said server configured to correlate said received expression with one of said stored expressions and to submit, to said database and in response to said received expression, the query associated with said one stored expression, said server further configured to transmit, to said client, a portion of said data retrieved by said database in response to said submitted query. - View Dependent Claims (2, 3)
-
-
4. A system for preventing unauthorized access of database systems, comprising:
-
a database configured to receive a query, to retrieve data based on said query, and to transmit said retrieved data; and
a first server configured to receive a request for data from a remote client, said request for data including at least one code word, said first server configured to translate said at least one code word into said query, to receive said data transmitted from said database, to encrypt said data transmitted from said database, and to transmit said encrypted data to said client. - View Dependent Claims (5, 6)
-
-
7. A method for preventing unauthorized access of a database systems, comprising the steps of:
-
establishing communication between a client and a first server;
receiving, at said first server, a first request for data transmitted from said client, said first request for data including at least one code word;
subsequent to said receiving step, translating said at least one code word into a first query;
querying a database with said first query;
retrieving data from said database based on said first query;
encrypting, at said first server, said data retrieved from said database at said first server; and
transmitting said retrieved data from said first server to said client. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification