Internal security system for a relational database system
First Claim
Patent Images
1. A internal security method for a relational database system, comprising the steps of:
- (a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;
(b) determining for each system user the restricted data information that such a system user shall have access;
(c) determining the hierarchical level of access for each system user with regard to the restricted data information;
(d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that is a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access;
(e) creating at least one relational access table with each of the first and second system users having at least one record in the relational access table and using a foreign key in the table created at step (e) that is linked to a primary key associated with each of the first and second system user'"'"'s table of the relational database system for controlling each of the first and second system users'"'"'respective downstream access to restricted data information that is determined at step (b) and preventing the first and second system users'"'"'respective downstream and upstream access to unauthorized restricted data information through the use of a foreign key and primary key link such that the first system user will have one or more records in the relational access table that will permit the first system user'"'"'s access to restricted data information that is determined for the first system user at step (b) to be joined with the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b), and the second system user will have one or more records in the relational access table will permit the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b); and
(f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at step (e).
10 Assignments
0 Petitions
Accused Products
Abstract
An internal security method for use with a relational database system is disclosed. The method is incorporated into a database system such that there is no need for security coding be layered on top of the system application software to prevent unauthorized access to restricted database information. The method of the present invention includes at least two embodiments and at least one of the embodiments has a “down the tree view” structure.
22 Citations
21 Claims
-
1. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1; (b) determining for each system user the restricted data information that such a system user shall have access; (c) determining the hierarchical level of access for each system user with regard to the restricted data information; (d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that is a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access; (e) creating at least one relational access table with each of the first and second system users having at least one record in the relational access table and using a foreign key in the table created at step (e) that is linked to a primary key associated with each of the first and second system user'"'"'s table of the relational database system for controlling each of the first and second system users'"'"'respective downstream access to restricted data information that is determined at step (b) and preventing the first and second system users'"'"'respective downstream and upstream access to unauthorized restricted data information through the use of a foreign key and primary key link such that the first system user will have one or more records in the relational access table that will permit the first system user'"'"'s access to restricted data information that is determined for the first system user at step (b) to be joined with the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b), and the second system user will have one or more records in the relational access table will permit the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b); and (f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at step (e). - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1; (b) determining for each system user the restricted data information that such a system user shall have access; (c) determining the hierarchical level of access for each system user with regard to the restricted data information; (d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that includes other than a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access; (e) creating at least one relational access table with each of the first and second system users having at least one record in the relational access table and using a foreign key in the table created at step (e) that is linked to a primary key associated with each of the first and second system user'"'"'s table of the relational database system for controlling each of the first and second system users'"'"'respective downstream access to restricted data information that is determined at step (b) and preventing respective downstream and upstream access to unauthorized restricted data information through the use of a foreign key and primary key link such that the first system user will have one or more records in the relational access table that will permit the first system user'"'"'s access to restricted data information that is determined for the first system user at step (b) to be joined with the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b), and the second system user will have one or more records in the relational access table will permit the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b); and (f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at steps (e). - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A internal security method for a relational database system, comprising the steps of:
-
(a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1; (b) determining for each system user the restricted data information that such a system user shall have access; (c) determining the hierarchical level of access for each system user with regard to the restricted data information; (d) determining for at least two system users, based on the hierarchical level of access determination at step (c), that a second system user with a lower hierarchical level of access has access to the restricted data information that is a subset and includes other than a subset of the restricted data information to which a first system user with a higher hierarchical level of access has access; (e) creating at least one relational access table with each of the first and second system users having at least one record in the relational access table and using a foreign key in the table created at step (e) that is linked to a primary key associated with each of the first and second system user'"'"'s table of the relational database system for controlling each of the first and second system users '"'"'respective downstream access to restricted data information that is determined at step (b) and preventing respective downstream and upstream access to unauthorized restricted data information through the use of a foreign key and primary key link such that the first system user will have one or more records in the relational access table that will permit the first system user'"'"'s access to restricted data information that is determined for the first system user at step (b) to be joined with the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b), and the second system user will have one or more records in the relational access table will permit the second system user'"'"'s access to restricted data information that is determined for the second system user at step (b); and (f) the first and second system users accessing restricted data information stored in the system databases according to the relational access table created at steps (e). - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification