Systems and Methods for Secure Access of Data
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment the present invention includes a computer-implemented method comprising receiving a first query in a local computer system to access data stored on a remote computer system the local computer system. Data elements of the remote data are associated with data elements of the local data. The query is transformed into multiple queries. A second query is sent to the remote computer system to retrieve remote data. A first data result is received and stored on the local computer system and incorporated into a third query. The third query is executed against the local data and the first data result to produce a result. Sensitive data may be stored locally in a dimension table of a star schema and non-sensitive data may be stored remotely in a fact table and another dimension table of the star schema, for example.
27 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A computer-implemented method comprising:
-
receiving a query at a first computer system; using a portion of the received query to access non-sensitive data stored at a second computer system, remotely separated from the first computer system, which relates to a response to the received query; generating the response to the received query using the non-sensitive data accessed from the second computer system and using another portion of the received query to access sensitive data that is stored locally at the first computer system; and sending the response as a reply to the received query. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory computer readable storage medium having stored thereon a computer executable program, which, when executed by a processor at a first computer system, causes the processor to perform a method comprising:
-
receiving a query at the first computer system; using a portion of the received query to access non-sensitive data stored at a second computer system, remotely separated from the first computer system, which relates to a response to the received query; generating the response to the received query using the non-sensitive data accessed from the second computer system and using another portion of the received query to access sensitive data that is stored locally at the first computer system; and sending the response as a reply to the received query. - View Dependent Claims (29, 30, 31, 32, 33, 34)
-
-
35. A computer system comprising:
one or more local computers, each local computer including a processor and a memory, the one or more local computers configured to; receive a query at the first computer system; use a portion of the received query to access non-sensitive data stored at a second computer system, remotely separated from the first computer system, which relates to a response to the received query; generate the response to the received query using the non-sensitive data accessed from the second computer system and using another portion of the received query to access sensitive data that is stored locally at the first computer system; and send the response as a reply to the received query. - View Dependent Claims (36, 37, 38, 39, 40)
Specification