Database access control
First Claim
Patent Images
1. A method for database access control, comprising:
- receiving an access request from a requesting user, the access request comprising user credentials identifying the requesting user and identifying requested data;
querying an authorization table with the user credentials, wherein the authorization table stores one or more data categories, each data category associated with one or more users that have access to data associated with the data category;
generating, based on the query of the authorization table, a security table that identifies a subset of the one or more data categories to which the requesting user has access, the security table different from the authorization table;
querying a base table that comprises a plurality of data entries with the identity of the requested data, each data entry mapped to at least one data category of the one or more data categories;
generating, based on the query of the base table, a candidate data entry table that includes data entries identified by the access request and the data categories to which each included data entry is mapped within the base table;
performing a join operation between the security table and the candidate data entry table to generate a result set, each result in the result set comprising a data entry within the candidate data entry table mapped to at least one data category included within the security table; and
providing the generated result set to the requesting user.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for database access control includes receiving an access request from a requesting user, the access request identifying one or more data entries stored in a base table storing a plurality a data entries each associated with a data category. The identified one or more data entries from the base table are retrieved and a security table including one or more data categories to which the requesting user is authorized to access is generated based on an identity of the requesting user. The data entries associated with a data category included in the security table are outputted as a result table.
-
Citations
17 Claims
-
1. A method for database access control, comprising:
-
receiving an access request from a requesting user, the access request comprising user credentials identifying the requesting user and identifying requested data; querying an authorization table with the user credentials, wherein the authorization table stores one or more data categories, each data category associated with one or more users that have access to data associated with the data category; generating, based on the query of the authorization table, a security table that identifies a subset of the one or more data categories to which the requesting user has access, the security table different from the authorization table; querying a base table that comprises a plurality of data entries with the identity of the requested data, each data entry mapped to at least one data category of the one or more data categories; generating, based on the query of the base table, a candidate data entry table that includes data entries identified by the access request and the data categories to which each included data entry is mapped within the base table; performing a join operation between the security table and the candidate data entry table to generate a result set, each result in the result set comprising a data entry within the candidate data entry table mapped to at least one data category included within the security table; and providing the generated result set to the requesting user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for database access control, comprising:
-
receiving an access request from a requesting user, the access request identifying one or more data entries stored in a base table, the base table comprising a plurality a data entries each associated with a data category; generating a candidate data entry table by querying the base table with the identity of the identified data entries, the candidate data entry table including the identified data entries and, for each identified data entry, the data category to which the identified data entry is mapped within the base table; generating a security table by querying, with an identity of the request user, an authorization table mapping each of a plurality of data categories to one or more users authorized to access the data category, the security table including one or more data categories to which the requesting user is authorized; performing a join operation between the security table and the candidate data entry table to generate a result table, each result in the result table comprising a data entry mapped to a data category within the security table; and outputting the result table.
-
-
11. A database access control system, comprising:
-
a non-transitory computer-readable memory storing executable computer instructions, the instructions comprising instructions for; receiving an access request from a requesting user, the access request comprising user credentials identifying the requesting user and identifying requested data; querying an authorization table with the user credentials, wherein the authorization table stores one or more data categories, each data category associated with one or more users that have access to data associated with the data category; generating, based on the query of the authorization table, a security table that identifies a subset of the one or more data categories to which the requesting user has access, the security table different from the authorization table; querying a base table that comprises a plurality of data entries with the identity of the requested data, each data entry mapped to at least one data category of the one or more data categories; generating, based on the query of the base table, a candidate data entry table that includes data entries identified by the access request and the data categories to which each included data entry is mapped within the base table; performing a join operation between the security table and the candidate data entry table to generate a result set, each result in the result set comprising a data entry within the candidate data entry table mapped to at least one data category included within the security table; and providing the generated result set to the requesting user; and a processor configured to execute the computer instructions. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification