Database application security
First Claim
Patent Images
1. A method, comprising:
- authenticating a user using a first authentication application;
granting the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on first settings associated with the user, the second authentication application being associated with a secure database;
granting using the second authentication application the user access to a database application associated with the secure database, the access of the user to the database application being based on second settings associated with the user, the user being restricted from accessing the second settings, wherein the second authentication application filters database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second settings associated with the user, wherein the second settings are access rights given to a group of users with similar database needs, wherein the access of the user to the database application is restricted to specific functions within the database application based on the second settings associated with the user; and
granting the user access to the secure database using the second authentication application, the access of the user to the secure database being based on the second settings associated with the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user'"'"'s credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database.
53 Citations
11 Claims
-
1. A method, comprising:
-
authenticating a user using a first authentication application; granting the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on first settings associated with the user, the second authentication application being associated with a secure database; granting using the second authentication application the user access to a database application associated with the secure database, the access of the user to the database application being based on second settings associated with the user, the user being restricted from accessing the second settings, wherein the second authentication application filters database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second settings associated with the user, wherein the second settings are access rights given to a group of users with similar database needs, wherein the access of the user to the database application is restricted to specific functions within the database application based on the second settings associated with the user; and granting the user access to the secure database using the second authentication application, the access of the user to the secure database being based on the second settings associated with the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
a database hardware server, comprising; a first authentication application for authenticating a user and for granting the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on first settings associated with the user, the second authentication application being associated with a secure database; and a second authentication application for granting the user access to a database application associated with the secure database, the access of the user to the database application being based on second settings associated with the user, the user being restricted from accessing the second settings, for filtering database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second set of user settings, wherein the second settings are access rights given to a group of users with similar database needs, wherein an access of the user to a selected database application is restricted to specific functions within the selected database application based on the second settings associated with the user, and for granting the user access to the secure database, the access of the user to the secure database being based on the second settings associated with the user. - View Dependent Claims (11)
Specification