Method and apparatus for generating page-level security in a computer generated report
First Claim
1. A method of viewing a report having a security tag associated with pages in the report such that a user can only view data authorized to be shown to the user, the method comprising:
- retrieving a report having a superset of pages, one or more pages from the superset of pages having a security tag associated therewith such that a plurality of security tags are associated with the superset of pages of the report;
obtaining a list of security identifiers associated with the user;
comparing the list of security identifiers associated with the user with the plurality of security tags associated with the superset of pages of the report;
deriving a subset of pages from the superset of pages based on the comparison such that the subset of pages only contains data that the user is authorized to view;
presenting the subset of pages as a report to the user; and
renumbering pages in the subset of pages such that the subset of pages are renumbered consecutively such that the report presented to the user appears to be complete without indicating that one or more of the superset of pages of the report are not presented to the user.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and computer program products are disclosed for generating and viewing an electronic report having security features that allow for “virtual bursting” of the report for multiple users. A single report having multiple pages is generated such that each or some of the pages have security tags that are compared to a security identifier list of a particular user that acts as a security clearance for that user. Through this comparison, a subset of pages from the report is formed which makes up a “report” from the user'"'"'s point of view that contains only data the user is allowed to see. This allows multiple users to view only authorized portions of a single report having page-level security determined by level breaks in the data.
-
Citations
18 Claims
-
1. A method of viewing a report having a security tag associated with pages in the report such that a user can only view data authorized to be shown to the user, the method comprising:
-
retrieving a report having a superset of pages, one or more pages from the superset of pages having a security tag associated therewith such that a plurality of security tags are associated with the superset of pages of the report;
obtaining a list of security identifiers associated with the user;
comparing the list of security identifiers associated with the user with the plurality of security tags associated with the superset of pages of the report;
deriving a subset of pages from the superset of pages based on the comparison such that the subset of pages only contains data that the user is authorized to view;
presenting the subset of pages as a report to the user; and
renumbering pages in the subset of pages such that the subset of pages are renumbered consecutively such that the report presented to the user appears to be complete without indicating that one or more of the superset of pages of the report are not presented to the user.
-
-
2. A method of viewing a report having a security tag associated with pages in the report such that a user can only view data authorized to be shown to the user, the method comprising:
-
retrieving a report having a superset of pages, one or more pages from the superset of pages having a security tag associated therewith such that a plurality of security tags are associated with the superset of pages of the report;
obtaining a list of security identifiers associated with the user;
comparing the list of security identifiers associated with the user with the plurality of security tags associated with the superset of pages of the report;
deriving a subset of pages from the superset of pages based on the comparison such that the subset of pages only contains data that the user is authorized to view;
presenting the subset of pages as a report to the user; and
renumbering pages in the subset of pages such that the first page in the subset of pages is page one and subsequent pages are renumbered consecutively such that the report presented to the user appears to be complete without indicating that one or more of the superset of pages of the report are not presented to the user. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable medium containing programmed instructions arranged to view a report having a security tag associated with pages in the report such that a user can only view data authorized to be shown to the user, the computer-readable medium including programmed instructions for:
-
retrieving a report having a superset of pages, one or more pages from the superset of pages having a security tag associated therewith such that a plurality of security tags are associated with the superset of pages of the report;
obtaining a list of security identifiers associated with the user;
comparing the list of security identifiers associated with the user with the plurality of security tags associated with the superset of pages of the report;
deriving a subset of pages from the superset of pages based on the comparison such that the subset of pages only contains data that the user is authorized to view;
presenting the subset of pages as a report to the user; and
renumbering pages in the subset of pages such that the subset of pages are renumbered consecutively such that the report presented to the user appears to be complete without indicating that one or more of the superset of pages of the report are not presented to the user. - View Dependent Claims (17, 18)
-
Specification