Method and apparatus for enabling database privileges
First Claim
Patent Images
1. A method for enabling privileges comprising:
- establishing a session on behalf of a user;
receiving a request to enable database privileges for the user;
upon receipt of the request to enable database privileges, verifying trusted security logic has previously been executed, wherein the act of verifying the trusted security logic comprises verifying a proxy user and checking a call stack; and
enabling database privileges for the user if the trusted security logic has previously been executed and is contained in one or more frames of the call stack.
0 Assignments
0 Petitions
Accused Products
Abstract
Methods for enabling database privileges are provided. The methods eliminate strict dependency on tradition password, or “secret” based security systems. Instead, database privileges are enabled based on verifying information stored in one or more frames of a call stack corresponds to trusted security logic. In another embodiment, database privileges are enabled based on policies identified in the trusted security logic. The methods and techniques described herein provide a flexible and extensible mechanisms for verifying that trusted security logic has been executed prior to enabling database privileges.
-
Citations
25 Claims
-
1. A method for enabling privileges comprising:
-
establishing a session on behalf of a user; receiving a request to enable database privileges for the user; upon receipt of the request to enable database privileges, verifying trusted security logic has previously been executed, wherein the act of verifying the trusted security logic comprises verifying a proxy user and checking a call stack; and enabling database privileges for the user if the trusted security logic has previously been executed and is contained in one or more frames of the call stack. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for enabling privileges, wherein the system is implemented at least in part with a processor, the system comprising:
-
means for establishing a session on behalf of a user; means for receiving a request to enable database privileges for the user; means for upon receipt of the request to enable database privileges, verifying trusted security logic has previously been executed, wherein means for verifying the trusted security logic comprises means for verifying a proxy user and checking a call stack; and means for enabling database privileges for the user if the trusted security logic has previously been executed and is contained in one or more frames of the call stack. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A client-server computer system comprising:
-
a computer including; a processor, a main memory communicatively coupled to the processor; and a disk storage communicatively coupled to the processor; a database running on the computer from the main memory, the database further comprising; one or more data structures stored in the disk storage, and a call slack stored in the main memory; an application program coupled to the database and configured to support a user; and a metadata repository embodied in the one or more data structures stored in the disk storage, the metadata repository comprising trusted security logic;
whereinthe application program is configured to initiate a call to enable database privileges, the call causing information to be stored in one or more frames of the call stack and one or more security functions to be executed; and
whereinthe database is configured to; verify the call stack comprises one or more frames corresponding to the trusted security logic; test a proxy user; and enable database privileges for the user if the trusted security logic is contained in the one or more frames of the call stack. - View Dependent Claims (16, 17, 18)
-
-
19. A computer-readable medium that comprises a non-volatile medium or a volatile medium, having stored therein one or more sequences of instruction for enabling privileges, the one or more sequences of instructions causing one or more processors to perform a number of acts, said acts comprising:
-
establishing a session on behalf of a user; receiving a request to enable database privileges for the user; upon receipt of the request to enable database privileges, verifying trusted security logic has previously been executed, wherein the act of verifying the trusted security logic comprises verifying a proxy user and checking a call stack; and enabling database privileges for the user if the trusted security logic has previously been executed and is contained in one or more frames of the call stack. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification