×

Internal security system for a relational database system

  • US 7,720,894 B2
  • Filed: 09/12/2006
  • Issued: 05/18/2010
  • Est. Priority Date: 07/27/2001
  • Status: Active Grant
First Claim
Patent Images

1. An internal security method for a relational database system, comprising one or more processors implementing the steps of:

  • (a) determining which data information from the total amount of data information stored in system databases is restricted data information that shall not be accessible by each and every 1 to N system users, where N is an integer greater than 1;

    (b) determining for each individual specific system user the restricted data information that such a system user shall have access;

    (c) creating at least one relational access table with each specific system user having at least one record in the relational access table and using a foreign key in the table created at step (c) that is linked to a primary key associated with a specific system user'"'"'s table of the relational database system for controlling that specific system user'"'"'s access to the restricted data information that was determined at step (b) and preventing downstream and upstream access to unauthorized restricted data information through the use of the foreign key and primary key link, such that a first specific system user will have one or more records in the relational access table that will permit the first specific system user'"'"'s access to restricted data information that is determined for the first specific system user to be joined with a second specific system user'"'"'s access to restricted data information that is determined for the second specific system user, and the specific second system user will have one or more records in the relational access table that will permit the second specific system user'"'"'s access to restricted data information that is determined for the second specific system user; and

    (d) each specific system user accessing restricted data information stored in the system databases according to the relational access table created at step (c) and specific one way joining links to restricted data information stored in the system databases of other system users according to step (c).

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×