×

Methods and systems for controlling access to custom objects in a database

  • US 8,095,531 B2
  • Filed: 10/02/2007
  • Issued: 01/10/2012
  • Est. Priority Date: 10/03/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for controlling access to objects in a database, wherein the database stores data specific to each one of a plurality of tenants such that at least two of the tenants store at least a portion of data specific to the at least two tenants in a common table within the database and wherein each tenant is permitted access only to data associated with that tenant, and wherein each tenant has one or more users, the method comprising:

  • (a) receiving, from a user associated with a first tenant, a request to access data of a first object in the common table of the database, the first object having a unique identification, wherein the common table includes a plurality of objects associated with the first tenant, and wherein the plurality of objects includes the first object, a second object, and a third object, each containing one or more data types specified by the first tenant;

    (b) using information of the first object to identify a key associated with the first object and the third object, but not associated with the second objectwherein the key includes a key prefix that equals a prefix of the unique identification, the unique identification having additional characters after the prefix;

    (c) retrieving the identified key from a table of the database;

    (d1) after retrieving the key, searching only that portion of a entity share table appropriate to the retrieved key to locate access information for the first object;

    (d2) selecting, by a processor, at least one rule from a plurality of permission rules that prevent a user associated with a particular tenant from seeing data in the database associated with the particular tenant to which the user is not permitted access;

    (e) determining whether the user has permission to access at least a portion of the first object based at least in part on the access information; and

    (f) sending, to the user, the requested data of the first object to which the user has permission to access.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×