Query server system security and privacy access profiles
First Claim
Patent Images
1. A method of controlling graduated access to data resources within an organization comprising the steps of:
- assigning security access privileges to organizational roles;
receiving a query determining an organizational role associated with a query source;
determining the availability of query data results in accordance with the security access privileges for the organizational role;
providing results to said query source based on said security access privileges.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of controlling graduated access to data resources within an organization may be performed by assigning security access privileges to organizational roles. When a query is received, the organizational role is associated with the query source. The security access privileges are used to determine the available query data results for the organizational role. Results are provided to the query source based on the security access privileges.
-
Citations
20 Claims
-
1. A method of controlling graduated access to data resources within an organization comprising the steps of:
-
assigning security access privileges to organizational roles;
receiving a query determining an organizational role associated with a query source;
determining the availability of query data results in accordance with the security access privileges for the organizational role;
providing results to said query source based on said security access privileges. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for enforcing graduated security access control to data in a data source within an organization comprising:
-
a query source, wherein said query source is assigned a role;
a security access profile associated with said role;
a query server connected to said query source; and
a data source connected to said query source;
wherein said query server provides query results to said query source according to restrictions based on said security access profile. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification