×

Database application security

  • US 8,566,908 B2
  • Filed: 09/14/2012
  • Issued: 10/22/2013
  • Est. Priority Date: 12/28/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • authenticating, by a server, a user using a first authentication application;

    granting, by the server, the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on a first setting associated with the user, the second authentication application being associated with a secure database;

    granting, by the server, using the second authentication application the user access to a database application associated with the secure database, the access of the user to the database application being based on a second setting associated with the user, the user being restricted from accessing the second setting, wherein the second authentication application filters database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second setting associated with the user, wherein the second setting is an access right given to a group of users with a similar database need, wherein the access of the user to the database application is restricted to a specific function within the database application based on the second setting associated with the user; and

    granting, by the server, the user access to the secure database using the second authentication application, the access of the user to the secure database being based on the second setting associated with the user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×