Schema signing
First Claim
1. A method for preventing unauthorized use of a database, the method comprising:
- verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid;
determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid;
denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with;
verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising;
verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity;
permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising;
permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and
obtaining at least one public key of the at least one trusted entity from a well-protected container included in a processing system, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity further comprises;
verifying that the digital signature for the at least one object is signed by a private key corresponding to one of the at least one public key of the at least one trusted entity.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the database schema only when the object of the database schema is verified to have a valid digital signature associated with the trusted entity. In another embodiment, an object in a database schema may be verified as having a digital signature associated with at least one trusted entity. An application may be permitted access to the object of the database schema only when the digital signature for the object is verified to be associated with the at least one trusted entity.
-
Citations
30 Claims
-
1. A method for preventing unauthorized use of a database, the method comprising:
-
verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid; determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid; denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with; verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising; verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity; permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising; permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and obtaining at least one public key of the at least one trusted entity from a well-protected container included in a processing system, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity further comprises; verifying that the digital signature for the at least one object is signed by a private key corresponding to one of the at least one public key of the at least one trusted entity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for preventing unauthorized use of a database, the method comprising:
-
verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid; determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid; denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with; verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising; verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity; and permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising; permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and failing to permit access to the at least one object when the digital signature for the at least one object is not associated with any of the at least one trusted entity, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity is performed when an attempt is made to access a database. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A machine-readable medium having instructions stored thereon for at least one processor, the machine-readable medium comprising:
-
instructions for verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid; instructions for determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid; instructions for denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with; instructions for verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising; instructions for verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity; instructions for permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising; permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and instructions for obtaining at least one public key of the at least one trusted entity from a well-protected container included in a processing system, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity further comprises; verifying that the digital signature for the at least one object is signed by a private key corresponding to one of the at least one public key of the at least one trusted entity, the machine-readable medium is an item from a group of items consisting of a memory, a magnetic disk and an optical disk. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A machine-readable medium having instructions stored thereon for at least one processor, the machine-readable medium comprising:
-
instructions for verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid; instructions for determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid; instructions for denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with; instructions for verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising; instructions for verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity; instructions for permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising; permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and instructions for failing to permit access to the at least one object when the digital signature for the at least one object is not associated with any of the at least one trusted entity, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity is performed when an attempt is made to access a database, the machine-readable medium is an item from a group of items consisting of a memory, a magnetic disk and an optical disk. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer-implemented system comprising:
-
a processor coupled to a memory, the memory storing instructions which when executed cause the processor to perform the acts of; verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid; determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid; denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with; verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising; verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity; permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising; permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and obtaining at least one public key of the at least one trusted entity from a well-protected container included in a processing system, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity further comprises; verifying that the digital signature for the at least one object is signed by a private key corresponding to one of the at least one public key of the at least one trusted entity. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A computer-implemented system comprising:
-
a processor coupled to a memory, the memory storing instructions which when executed cause the processor to perform the acts of; verifying whether or not a digital signature associated with the at least one object defined in a database schema is valid; determining that the at least one object defined in the database schema has been tampered with if the digital signature of the at least one object is determined to not be valid; denying access to the at least one object based on a result of determination that the at least one object defined in the database schema has been tampered with; verifying that a digital signature for the at least one object defined in a database schema is associated with at least one trusted entity comprising; verifying that a digital signature for an object of the at least one object is associated with the at least one trusted entity; permitting access to the at least one object only when the digital signature for the at least one object is verified to be associated with the at least one trusted entity comprising; permitting access to the object of the at least one object only when the digital signature for the object of at least one object is verified to be associated with the at least one trusted entity; and failing to permit access to the at least one object when the digital signature for the at least one object is not associated with any of the at least one trusted entity, wherein the verifying that a digital signature for at least one object defined in a database schema is associated with at least one trusted entity is performed when an attempt is made to access a database. - View Dependent Claims (27, 28, 29, 30)
-
Specification