Internal security system for a relational database system
First Claim
Patent Images
1. An internal security method for a relational database system, comprising the steps of:
- (a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) creating at least one relational access table with each system user having at least one record in the relational access table and using a foreign key in the table created at step (c) that is linked to a primary key associated with a system user'"'"'s table of the relational database system for controlling the system user'"'"'s downstream access to the restricted data information that was determined at step (b) and preventing downstream and upstream access to unauthorized restricted data information through the use of the foreign key and primary key link; and
(d) each system user accessing restricted data information stored in the system databases according to the relational access table created at step (c).
5 Assignments
0 Petitions
Accused Products
Abstract
An internal security method for use with a relational database system is disclosed. The method is incorporated into a database system such that there is no need for security coding be layered on top of the system application software to prevent unauthorized access to restricted database information. The method of the present invention includes at least two embodiments and at least one of the embodiments has a “down the tree view” structure.
-
Citations
7 Claims
-
1. An internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) creating at least one relational access table with each system user having at least one record in the relational access table and using a foreign key in the table created at step (c) that is linked to a primary key associated with a system user'"'"'s table of the relational database system for controlling the system user'"'"'s downstream access to the restricted data information that was determined at step (b) and preventing downstream and upstream access to unauthorized restricted data information through the use of the foreign key and primary key link; and
(d) each system user accessing restricted data information stored in the system databases according to the relational access table created at step (c). - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification