×

Database application security

  • US 8,307,406 B1
  • Filed: 12/28/2005
  • Issued: 11/06/2012
  • Est. Priority Date: 12/28/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • authenticating a user using a first authentication application;

    granting the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on first settings associated with the user, the second authentication application being associated with a secure database;

    granting using the second authentication application the user access to a database application associated with the secure database, the access of the user to the database application being based on second settings associated with the user, the user being restricted from accessing the second settings, wherein the second authentication application filters database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second settings associated with the user, wherein the second settings are access rights given to a group of users with similar database needs, wherein the access of the user to the database application is restricted to specific functions within the database application based on the second settings associated with the user; and

    granting the user access to the secure database using the second authentication application, the access of the user to the secure database being based on the second settings associated with the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×