Database application security
First Claim
Patent Images
1. A method, comprising:
- authenticating, by a server, a user using a first authentication application;
granting, by the server, the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on a first setting associated with the user, the second authentication application being associated with a secure database;
granting, by the server, using the second authentication application the user access to a database application associated with the secure database, the access of the user to the database application being based on a second setting associated with the user, the user being restricted from accessing the second setting, wherein the second authentication application filters database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second setting associated with the user, wherein the second setting is an access right given to a group of users with a similar database need, wherein the access of the user to the database application is restricted to a specific function within the database application based on the second setting associated with the user; and
granting, by the server, the user access to the secure database using the second authentication application, the access of the user to the secure database being based on the second setting associated with the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user'"'"'s credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database.
-
Citations
11 Claims
-
1. A method, comprising:
-
authenticating, by a server, a user using a first authentication application; granting, by the server, the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on a first setting associated with the user, the second authentication application being associated with a secure database; granting, by the server, using the second authentication application the user access to a database application associated with the secure database, the access of the user to the database application being based on a second setting associated with the user, the user being restricted from accessing the second setting, wherein the second authentication application filters database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second setting associated with the user, wherein the second setting is an access right given to a group of users with a similar database need, wherein the access of the user to the database application is restricted to a specific function within the database application based on the second setting associated with the user; and granting, by the server, the user access to the secure database using the second authentication application, the access of the user to the secure database being based on the second setting associated with the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
a hardware server, comprising; a first authentication application authenticating a user and for granting the user access to a second authentication application in response to successfully authenticating the user using the first authentication application and based on a first setting associated with the user, the second authentication application being associated with a secure database; and a second authentication application for granting the user access to a database application associated with the secure database, the access of the user to the database application being based on a second setting associated with the user, the user being restricted from accessing the second setting, for filtering database access commands for manipulating the secure database entered by the user based on a list of accepted database access commands included in the second user setting, wherein the second setting is an access right given to a group of users with a similar database need, wherein an access of the user to a selected database application is restricted to a specific function within the selected database application based on the second setting associated with the user, and for granting the user access to the secure database, the access of the user to the secure database being based on the second setting associated with the user. - View Dependent Claims (11)
Specification