×

Internal security system for a relational database system

  • US 7,130,852 B2
  • Filed: 07/27/2001
  • Issued: 10/31/2006
  • Est. Priority Date: 07/27/2001
  • Status: Active Grant
First Claim
Patent Images

1. A internal security method for a relational database system, comprising the steps of:

  • (a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;

    (b) determining for each system user the restricted data information that such a system user shall have access;

    (c) determining the hierarchical level of access for each system user with regard to the restricted data information;

    (d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that is a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access;

    (e) creating at least one relational access table with each of the first and second system users having at least one record in the relational access table and using a foreign key in the table created at step (e) that is linked to a primary key associated with each of the first and second system user'"'"'s table of the relational database system for controlling each of the first and second system users'"'"'respective downstream access to restricted data information that is determined at step (b) and preventing the first and second system users'"'"'respective downstream and upstream access to unauthorized restricted data information through the use of a foreign key and primary key link such that the first system user will have one or more records in the relational access table that will permit the first system user'"'"'s access to restricted data information that is determined for the first system user at step (b) to be joined with the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b), and the second system user will have one or more records in the relational access table will permit the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b); and

    (f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at step (e).

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×