System and method for protecting sensitive data
First Claim
1. A computer-implemented method of managing access to sensitive data in a database, comprising:
- receiving a query against the data in the database, the query comprising at least;
(i) a result field specification including one or more result fields characterizing which fields are to be returned in a result set for the query; and
(ii) a sorting instruction to sort the result set on the basis of a selected result field to produce a sorted result set;
retrieving the result set from the database;
filtering the retrieved result set on the basis of predefined filtering rules to remove selected data from the selected result field of at least one data record included with the retrieved result set; and
sorting the filtered result set according to the sorting instruction to produce the sorted result set, whereby the sorting is done independently of the removed selected data so that the sorted result set places the at least one data record at a position which is non-indicative of a value of the removed selected data.
5 Assignments
0 Petitions
Accused Products
Abstract
A method, system and article of manufacture for protecting sensitive data in databases and, more particularly, for managing access to sensitive data in a database. One embodiment comprises receiving a query against the data in the database comprising at least (i) a result field specification, and (ii) a sorting instruction. The method further comprises retrieving a result set from the database, and filtering the retrieved result set on the basis of predefined filtering rules to remove selected data from a selected result field of at least one data record included with the retrieved result set. The filtered result set is sorted according to the sorting instruction to produce the sorted result set, whereby the sorting is done independently of the removed selected data so that the sorted result set places the at least one data record at a position which is non-indicative of a value of the removed selected data.
-
Citations
20 Claims
-
1. A computer-implemented method of managing access to sensitive data in a database, comprising:
-
receiving a query against the data in the database, the query comprising at least;
(i) a result field specification including one or more result fields characterizing which fields are to be returned in a result set for the query; and
(ii) a sorting instruction to sort the result set on the basis of a selected result field to produce a sorted result set;
retrieving the result set from the database;
filtering the retrieved result set on the basis of predefined filtering rules to remove selected data from the selected result field of at least one data record included with the retrieved result set; and
sorting the filtered result set according to the sorting instruction to produce the sorted result set, whereby the sorting is done independently of the removed selected data so that the sorted result set places the at least one data record at a position which is non-indicative of a value of the removed selected data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium containing a program which, when executed by a processor, performs operations for managing access to sensitive data in a database, the operations comprising:
-
receiving a query against the data in the database, the query comprising at least;
(i) a result field specification including one or more result fields characterizing which fields are to be returned in a result set for the query; and
(ii) a sorting instruction to sort the result set on the basis of a selected result field to produce a sorted result set;
retrieving the result set from the database;
filtering the retrieved result set on the basis of predefined filtering rules to remove selected data from the selected result field of at least one data record included with the retrieved result set; and
sorting the filtered result set according to the sorting instruction to produce the sorted result set, whereby the sorting is done independently of the removed selected data so that the sorted result set places the at least one data record at a position which is non-indicative of a value of the removed selected data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification