Method for creating a stored query
First Claim
1. A method for creating a stored query for remotely accessing information comprising:
- receiving, at said computer, a selection of a query type, wherein said query type corresponds to a query template;
receiving, at said computer, a query field and query criteria, wherein said query criteria is selected from an input list having a profile and stored at said computer;
creating, at said computer, said query field, said query criteria, and said query type into a Structured Query Language (SQL) statement;
executing, by said computer, said SQL statement to add said query field and said query criteria to said query template;
creating, by said computer, said stored query based on said query template, wherein said stored query is stored in a query database;
executing, by said computer, said stored query to create a first file;
categorizing, at said computer, said first file such that it is available to a pre-determined group of users;
placing, by said computer, said first file in a location accessible to said pre-determined group of users,communicating, by said computer, with an intermediary device, wherein said intermediary device;
remotely obtains access data including location information and authentication credentials, wherein said access data is used to locate and at least one of;
grant and deny access to said secure system, using a device of one of said pre-determined group of users;
transmits said access data to said secure system;
receives a validation of said access data from said secure system; and
,allows said access to said secure system; and
performing, by said computer, an analysis of said query database, wherein said analysis is based on performance data resulting from execution of said stored query on a database, and wherein said analysis determines at least one of;
database fields that are queried least often and database fields that are queried most often.
4 Assignments
0 Petitions
Accused Products
Abstract
A database system includes an intermediary program that provides a variety of functions. Logging on to the intermediary program results in log-in information being transmitted from an encrypted file to the database system via the intermediary program. The database system includes the ability for the user to enter criteria for a query in a variety of different manners, including the ability to directly modify generated SQL statements and the ability to use input lists in creating queries. In addition, the queries entered by the user can be stored in a separate database, such that the efficiency and operation of the database system can be improved. In addition, the delivery of query results and reports allows for delivery of files that are associated with a data period in any format and also allows the user to receive multiple reports in a single, compressed file.
-
Citations
18 Claims
-
1. A method for creating a stored query for remotely accessing information comprising:
-
receiving, at said computer, a selection of a query type, wherein said query type corresponds to a query template; receiving, at said computer, a query field and query criteria, wherein said query criteria is selected from an input list having a profile and stored at said computer; creating, at said computer, said query field, said query criteria, and said query type into a Structured Query Language (SQL) statement; executing, by said computer, said SQL statement to add said query field and said query criteria to said query template; creating, by said computer, said stored query based on said query template, wherein said stored query is stored in a query database; executing, by said computer, said stored query to create a first file; categorizing, at said computer, said first file such that it is available to a pre-determined group of users; placing, by said computer, said first file in a location accessible to said pre-determined group of users, communicating, by said computer, with an intermediary device, wherein said intermediary device; remotely obtains access data including location information and authentication credentials, wherein said access data is used to locate and at least one of;
grant and deny access to said secure system, using a device of one of said pre-determined group of users;transmits said access data to said secure system; receives a validation of said access data from said secure system; and
,allows said access to said secure system; and performing, by said computer, an analysis of said query database, wherein said analysis is based on performance data resulting from execution of said stored query on a database, and wherein said analysis determines at least one of;
database fields that are queried least often and database fields that are queried most often. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable memory tangibly embodying a program of instructions executable by a machine, said plurality of instructions comprising:
-
instructions to receive a selection of a query type, wherein said query type corresponds to a query template; instructions to receive a query field and query criteria, wherein said query criteria is selected from said an input list having a profile; instructions to create said query field, said query criteria, and said query type into a Structured Query Language (SQL) statement; instructions to execute said SQL statement to add said query field and said query criteria to said query template; instructions to create a stored query based on said query template, wherein said stored query is stored in a query database; instructions to execute said stored query to create a first file instructions to categorize said first file such that it is available to a pre-determined group of users; instructions to place said first file in a location accessible to said pre-determined group of users; and
,instructions to communicate with an intermediary device, wherein said intermediary device; remotely obtains access data including location information and authentication credentials, wherein said access data is used to locate and at least one of;
grant and deny access to said secure system, using a device of one of said pre-determined group of users;transmits said access data to said secure system; receives a validation of said access data from said secure system; and
,allows said access to said secure system; and instructions to perform an analysis of said query database, wherein said analysis is based on performance data resulting from execution of said stored query on a database, and wherein said analysis determines at least one of;
database fields that are queried least often and database fields that are queried most often.
-
Specification