Authentication enforcement at resource level
First Claim
Patent Images
1. A computer-implemented method comprising:
- providing authentication enforcement at resource level by;
receiving, at a server, a request from a requester through a client to access a particular database of a resource;
enforcing authentication of the requester by challenging the requester to provide at least one authentication credential corresponding to at least one authentication key that is an attribute of a table of the particular database being accessed to verify an identity of the requester, the at least one authentication key being specified at design time; and
authenticating the requester by comparing the at least one authentication credential against the at least one authentication key that is an entry of the attribute in the table of the particular database being accessed.
2 Assignments
0 Petitions
Accused Products
Abstract
The present description refers in particular to a computer-implemented method, a computer system, and a computer program product. The method may comprise providing authentication enforcement at resource level by specifying at design time at least one authentication key for at least one data storage unit of a resource. A request may be received at a server from a requester through a client to access the resource. Authentication of the requester may be enforced through the at least one authentication key at the at least one data storage unit of the resource.
5 Citations
22 Claims
-
1. A computer-implemented method comprising:
providing authentication enforcement at resource level by; receiving, at a server, a request from a requester through a client to access a particular database of a resource; enforcing authentication of the requester by challenging the requester to provide at least one authentication credential corresponding to at least one authentication key that is an attribute of a table of the particular database being accessed to verify an identity of the requester, the at least one authentication key being specified at design time; and authenticating the requester by comparing the at least one authentication credential against the at least one authentication key that is an entry of the attribute in the table of the particular database being accessed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
13. A computer program product comprising computer readable instructions, which when loaded and run in a computer or computer network system, causes the computer system or the computer network system to perform operations including:
-
receiving, at a server, a request from a requester through a client to access a particular database of a resource; enforcing authentication of the requester by challenging the requester to provide at least one authentication credential corresponding to at least one authentication key that is an attribute of table of the particular database being accessed to verify an identity of the user, the at least one authentication key being specified at design time; and authenticating the requester by comparing the at least one authentication credential against the at least one authentication key that is an entry of the attribute in the table of the particular database being accessed.
-
-
14. A non-transitory machine-readable medium embodying instructions, which when executed by at least one processing unit of a machine, cause the machine to perform operations comprising:
-
receiving, at a server, a request from a requester through a client to access a particular database of a resource; enforcing authentication of the requester by challenging the requester to provide at least one authentication credential corresponding to at least one authentication key that is an attribute of a table of the particular database being accessed to verify an identity of the requester, the at least one authentication key being specified at design time; and authenticating the requester by comparing the at least one authentication credential against the at least one authentication key that is an entry of the attribute in the table of the particular database being accessed.
-
-
15. A computer system comprising:
an authentication mechanism having at least one processing unit for authentication enforcement at a table level of a particular database, operable to perform operations comprising; receiving, at a server, a request from a requester through a client to access the particular database in a resource; enforcing authentication of the requester by challenging the requester to provide at least one authentication credential corresponding to at least one authentication key that is an attribute of a table of the particular database being accessed to verify an identity of the requester, the at least one authentication key being specified at design time; and authenticating the requester by comparing the at least one authentication credential against the at least one authentication key that is an entry of the attribute in the table of the particular database being accessed. - View Dependent Claims (18, 19, 20, 21, 22)
-
16. A computer program product comprising computer readable instructions store on a device, which when loaded and run in a computer or computer network system, causes the computer system or the computer network system to perform operations including:
-
receiving at a server a request from a requester through a client to access a particular database of a resource; enforcing authentication of the requester by challenging the requester to provide at least one authentication credential corresponding to at least one authentication key that is an attribute of a table of the particular database being accessed to verify an identity of the user, the at least one authentication key being specifying at design time; and authenticating the requester by comparing the at least one authentication credential against the at least one authentication key that is an entry of the attribute in the table of the particular database being accessed. - View Dependent Claims (17)
-
Specification