×

Schema signing

  • US 8,850,209 B2
  • Filed: 09/12/2006
  • Issued: 09/30/2014
  • Est. Priority Date: 09/12/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for preventing unauthorized use of a database, the method comprising:

  • verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid;

    determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid;

    denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with;

    verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising;

    verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity;

    permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising;

    permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and

    obtaining at least one public key of the at least one trusted entity from a well-protected container included in a processing system, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity further comprises;

    verifying that the digital signature for the at least one object is signed by a private key corresponding to one of the at least one public key of the at least one trusted entity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×