Accessing Data Stored In A Database System
First Claim
1. A computer-implemented method for accessing data stored in a database system comprising a controller configured in such a way that the data is stored with relationships between data-elements of the data, and with enforcement of integrity of the data;
- whereina first data-element and a second data-element of the data are stored in the database system with a relationship between the first data-element and the second data-element;
whereinthe first data-element is stored in the database system encapsulated by one or more first access-procedures so that the first data-element is accessible exclusively by calling the one or more first access-procedures;
whereinthe second data-element is stored in the database system encapsulated by one or more second access-procedures so that the second data-element is accessible exclusively by calling the one or more second access-procedures;
whereinthe database system further stores access authorization data indicating, at data-element level, whether access to second data-element is authorized to a first user identified in the database system through corresponding credentials that enable the first user to log in and operate in the database system;
the method comprising;
receiving, by the controller, a call by the first user to a first access-procedure of the one or more first access-procedures for attempting to access the first data-element, said first access-procedure of the one or more first access-procedures including a call to a second access-procedure of the one or more second access-procedures for attempting to access the second data-element based on the relationship between first and second data-elements;
performing, by the controller, the call to said first access-procedure of the one or more first access-procedures;
verifying, by the controller, whether the first user is authorized to access the second data-element according to the access authorization data;
performing, by the controller, the call to said second access-procedure of the one or more second access-procedures; and
returning, by the controller, a result of the attempt to access the second data-element, including an indicator of whether the first user is authorized to access the second data-element.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented methods are disclosed for accessing data stored in a database system comprising a controller configured in such a way that data is stored with relationships between data-elements of the data, and with enforcement of data integrity. The method comprises receiving, by the controller, a call by first user to a first access-procedure for accessing a first data-element, the first access-procedure including a call to second access-procedure for accessing a second data-element based on a relationship between the first and second data-elements; performing, by the controller, the call to the first access-procedure; verifying, by the controller, whether the first user is authorized to access the second data-element according to access authorization data; performing, by the controller, the call to the second access-procedure; and returning, by the controller, a result of the access to the second data-element including an indicator of authorized access to the second data-element. Computer programs and database systems suitable for performing such methods are also disclosed.
3 Citations
23 Claims
-
1. A computer-implemented method for accessing data stored in a database system comprising a controller configured in such a way that the data is stored with relationships between data-elements of the data, and with enforcement of integrity of the data;
- wherein
a first data-element and a second data-element of the data are stored in the database system with a relationship between the first data-element and the second data-element;
whereinthe first data-element is stored in the database system encapsulated by one or more first access-procedures so that the first data-element is accessible exclusively by calling the one or more first access-procedures;
whereinthe second data-element is stored in the database system encapsulated by one or more second access-procedures so that the second data-element is accessible exclusively by calling the one or more second access-procedures;
whereinthe database system further stores access authorization data indicating, at data-element level, whether access to second data-element is authorized to a first user identified in the database system through corresponding credentials that enable the first user to log in and operate in the database system; the method comprising; receiving, by the controller, a call by the first user to a first access-procedure of the one or more first access-procedures for attempting to access the first data-element, said first access-procedure of the one or more first access-procedures including a call to a second access-procedure of the one or more second access-procedures for attempting to access the second data-element based on the relationship between first and second data-elements; performing, by the controller, the call to said first access-procedure of the one or more first access-procedures; verifying, by the controller, whether the first user is authorized to access the second data-element according to the access authorization data; performing, by the controller, the call to said second access-procedure of the one or more second access-procedures; and returning, by the controller, a result of the attempt to access the second data-element, including an indicator of whether the first user is authorized to access the second data-element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 23)
- wherein
-
22. (canceled)
Specification