Schema signing
First Claim
1. A method for verifying trust of at least one object in a database schema before permitting access to the at least one object, the method comprising:
- verifying that a digital signature for the at least one object is associated with a trusted entity;
verifying a validity of the digital signature of the at least one object; and
permitting access to the at least one object only when the at least one object is verified to be trusted, the at least one object being verified to be trusted only when the digital signature of the at least one object is verified to be associated with the trusted entity and the digital signature of the at least one object is verified to be valid.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the database schema only when the object of the database schema is verified to have a valid digital signature associated with the trusted entity. In another embodiment, an object in a database schema may be verified as having a digital signature associated with at least one trusted entity. An application may be permitted access to the object of the database schema only when the digital signature for the object is verified to be associated with the at least one trusted entity.
-
Citations
40 Claims
-
1. A method for verifying trust of at least one object in a database schema before permitting access to the at least one object, the method comprising:
-
verifying that a digital signature for the at least one object is associated with a trusted entity; verifying a validity of the digital signature of the at least one object; and permitting access to the at least one object only when the at least one object is verified to be trusted, the at least one object being verified to be trusted only when the digital signature of the at least one object is verified to be associated with the trusted entity and the digital signature of the at least one object is verified to be valid. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine-readable medium having instructions stored thereon for at least one processor, the machine-readable medium comprising:
-
instructions for verifying that a respective digital signature for each of a plurality of objects defined in a database schema is associated with at least one trusted entity; instructions for verifying that each of the respective digital signatures is valid; and instructions for permitting access to an object of the plurality of objects only when the respective digital signature of the object of the plurality of objects is verified to be associated with the at least one trusted entity and the respective digital signature for the object of the plurality of objects is verified to be valid. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for providing access to at least one object in a database schema, the method comprising:
-
receiving a request for access to the at least one object in the database schema from a remote processing device; obtaining at least one public key of at least one trusted entity; verifying that a public key associated with a respective digital signature of each of the at least one object in the database schema is equal to one of the at least one public key of the at least one trusted entity; verifying that each of the respective digital signatures of each of the at least one object is valid; and permitting access to one of the at least one object from the remote processing device only when the respective digital signature of the one of the at least one object is verified to be trusted, the at least one object being verified to be trusted when the digital signature for the one of the at least one object is verified to be signed by a private key corresponding to one of the at least one public key of the at least one trusted entity and the digital signature of the one of the at least one object is verified to be valid. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method for preventing unauthorized use of a database, the method comprising:
-
verifying that a digital signature for at least one object in a database schema is associated with at least one trusted entity; and permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A machine-readable medium having instructions stored thereon for at least one processor, the machine-readable medium comprising:
-
instructions for verifying that a respective digital signature for each of a plurality of objects defined in a database schema is associated with at least one trusted entity; and instructions for permitting access to an object of the plurality of objects only when the respective digital signature of the object of the plurality of objects is verified to be associated with the at least one trusted entity. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
-
36. A method for providing access to at least one object in a database schema, the method comprising:
-
receiving a request for access to the at least one object in the database schema from a remote processing device; obtaining at least one public key of at least one trusted entity from a well-protected container, verifying that a public key associated with a respective digital signature of each object of the at least one object in a database schema is equal to one of the at least one public key of the at least one trusted entity, and permitting access to one of the at least one object from the remote processing device only when the public key associated with the respective digital signature of the one of the at least one object is verified to be equal to the one of the at least one public key of the at least one trusted entity. - View Dependent Claims (37, 38, 39, 40)
-
Specification