Method and apparatus for maintaining data integrity
First Claim
Patent Images
1. A method comprising:
- receiving a request to perform an action on a data element;
analyzing the request to perform an action based on at least one data access rule associated with the data element, wherein analyzing the request to perform an action further utilizes a data structure model associated with the data element;
approving the request to perform an action if the request satisfies the at least one access rule; and
rejecting the request to perform an action if the request is does not satisfy the at least one access rule.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for controlling data access to maintain data integrity. A request is received to perform an action on a data element. The request is analyzed based on at least one data access rule associated with the data element. This analysis further utilizes a data structure model associated with the data element. The request is approved if the request satisfies the data access rule. The request is rejected if the request does not satisfy the data access rule.
16 Citations
33 Claims
-
1. A method comprising:
-
receiving a request to perform an action on a data element;
analyzing the request to perform an action based on at least one data access rule associated with the data element, wherein analyzing the request to perform an action further utilizes a data structure model associated with the data element;
approving the request to perform an action if the request satisfies the at least one access rule; and
rejecting the request to perform an action if the request is does not satisfy the at least one access rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving a hypertext transfer protocol (HTTP) request message including information relating to a requested action and a particular data element;
analyzing the requested action based on a set of data access rules associated with the data element;
executing the requested action if the requested action satisfies the set of data access rules; and
rejecting the requested action if the request does not satisfy the set of data access rules. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
generating a request to perform an action on a data element;
communicating the request to perform an action to a data access controller, the data access controller being configured to analyze the request to perform an action based on at least one data access rule and a data structure model, wherein the data structure model is associated with the data element;
receiving an approval to perform the action if the request satisfies the at least one data access rule; and
receiving a rejection with respect to performing the action if the request does not satisfy the at least one data access rule. - View Dependent Claims (24, 25, 26)
-
-
27. A computer-readable medium comprising:
-
instructions for causing one or more processors to receive a request to perform an action on a data element;
instructions for causing one or more processors to analyze the request to perform an action based on a plurality of data access rules and a data structure model, wherein the data structure model is associated with the data element;
instructions for causing one or more processors to approve the request to perform an action if the request satisfies the plurality of data access rules; and
instructions for causing one or more processors to reject the request to perform an action if the request does not satisfy the plurality of data access rules.
-
-
28. An apparatus comprising:
-
a data access controller configured to receive data access requests from a plurality of computing devices;
a permission verifier coupled to the data access controller and configured to determine whether to approve a particular data access request;
a data structure model coupled to the permission verifier, wherein the data structure model identifies relationships between a plurality of data elements; and
a plurality of data access rules accessible by the permission verifier, wherein the plurality of data access rules are applied by the permission verifier when determining whether to approve a particular data access request. - View Dependent Claims (29, 30)
-
-
31. An apparatus comprising:
-
means for receiving a request to perform an action related to a data element;
means for analyzing the request to perform an action based on a data access rule;
means for identifying a data structure model associated with the data element;
means for executing the request to perform an action if the request satisfies the data access rule; and
means for rejecting the request to perform an action if the request does not satisfy the data access rule. - View Dependent Claims (32, 33)
-
Specification