SYSTEMS AND METHODS FOR EFFICIENT ACCESS CONTROL
First Claim
1. A method, comprising steps of:
- receiving, at a processor, a statement requesting an access for a user to a data file stored in a non-transitory memory medium;
parsing, by the processor, the statement into one or more arguments, wherein each argument ends with a logical operator except a last argument in the statement;
computing, by the processor, a skip count for each of the arguments;
evaluating, by the processor, the statement using the skip counts to determine whether the access should be granted to the user;
retrieving, by the processor, the data file from the non-transitory memory medium; and
sending, by the processor, the data file to the user, if the access is granted.
7 Assignments
0 Petitions
Accused Products
Abstract
An apparatus configured for database access control. The apparatus includes a memory and a processor coupled to the memory, wherein the processor is configured to execute instructions. The instructions include receiving a statement requesting access for a user to data files stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data files from the non-transitory memory medium; and sending the data files to the user, if the access is granted.
-
Citations
20 Claims
-
1. A method, comprising steps of:
-
receiving, at a processor, a statement requesting an access for a user to a data file stored in a non-transitory memory medium; parsing, by the processor, the statement into one or more arguments, wherein each argument ends with a logical operator except a last argument in the statement; computing, by the processor, a skip count for each of the arguments; evaluating, by the processor, the statement using the skip counts to determine whether the access should be granted to the user; retrieving, by the processor, the data file from the non-transitory memory medium; and sending, by the processor, the data file to the user, if the access is granted. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising:
a non-transitory computer-readable medium comprising instructions which, when executed by a processor of a computing system, cause the processor to perform the steps of; receiving a statement requesting an access for a user to a data file stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator except a last argument in the statement; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data file from the non-transitory memory medium; and sending the data file to the user, if the access is granted. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. An apparatus, comprising:
-
a memory; and a processor coupled to the memory, the processor being configured to execute the steps of; receiving a statement requesting an access for a user to a data file stored in a non-transitory memory medium; parsing the statement into one or more arguments, wherein each argument ends with a logical operator except a last argument in the statement; computing a skip count for each of the arguments; evaluating the statement using the skip counts to determine whether the access should be granted to the user; retrieving the data file from the non-transitory memory medium; and sending the data file to the user, if the access is granted. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification