TECHNIQUES FOR DATABASE STRUCTURE AND MANAGEMENT
First Claim
1. A secure database system for use in a wireless communication system, the database comprising:
- a database management system (DBMS) for processing data queries;
a rules unit for receiving data queries from the DBMS, and for providing the queried data only if the data query satisfies at least one predefined rule; and
a tree based database coupled to said rules unit for storing data in a hierarchical structure, and providing said stored data to said rules unit upon request.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment is related to a database system for protecting data privacy and efficient organization of data. An enhanced database system comprises a DBMS, a data classifier, a database of applications and a rules and policy unit. The DBMS includes a query processor for processing a query from a user. The rules and policy unit outputs a pointer to a node within the data classification tree based on several criteria. In accordance with another embodiment, a DBMS residing within a communication network organizes data related to the ID of mobile users. In accordance with another embodiment, an enhanced database system comprises a DRM user agent and a DBMS. The DRM user agent receives a CO protected by DRM. The DBMS stores the CO and controls access to the CO based on restrictions specified in an RO associated with the CO.
96 Citations
25 Claims
-
1. A secure database system for use in a wireless communication system, the database comprising:
-
a database management system (DBMS) for processing data queries; a rules unit for receiving data queries from the DBMS, and for providing the queried data only if the data query satisfies at least one predefined rule; and a tree based database coupled to said rules unit for storing data in a hierarchical structure, and providing said stored data to said rules unit upon request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A database system for securely managing identity (ID) related information for use in access control for a wireless communication network, the database system comprising:
-
an ID management and service access controller system (IDMS/ACS) for managing access to the wireless communication network based on information contained in a user ID profile (UID-PR); a UID-PR exporter; a UID-PR importer; and an ID-database management system (ID-DBMS) for providing an interface between the IDMS/ACS and the UID-PR importer and UID-PR-exporter. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A database system for storing and protecting digital rights management (DRM) content, the system comprising:
-
an application for using and requesting DRM protected content; at least one DRM user agent for storing DRM agent specific protected DRM data; a database management system (DBMS) for receiving requests for DRM protected content from the application, and retrieving the requested DRM content from the at least one DRM user agent. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A database system for storing and protecting digital rights management (DRM) content using common trans-ciphering, the system comprising:
-
at least one DRM system;
for using and providing DRM encrypted content objects (COs);a common trans-ciphering (CTC) unit for re-encrypting different content objects originally encrypted for different DRM systems with different encryption/decryption algorithms and for storing them in a protected memory. a database management system (DBMS) for receiving COs from the least one DRM system and providing them to the CTC unit only if the COs satisfy predefined rules and classification requirements. - View Dependent Claims (22, 23, 24, 25)
-
Specification