Securing database content
First Claim
Patent Images
1. A method for accessing a database, comprising:
- receiving, by a server, an update query associated with the database, the update query sent from a client device requesting an update to the database, the update query specifying a column in the database and validation values for authenticating the update requested to the database;
querying, by the server, a database specification for the column specified by the update query, the database specification electronically associating challenge columns in challenge tables to columns in the database;
identifying, by the server, a first challenge column of the challenge columns in the database specification that is electronically associated to the column specified by the update query;
identifying, by the server, a second challenge column of the challenge columns in the database specification that is electronically associated to the column specified by the update query;
identifying, by the server, two challenge values from the challenge columns, a first challenge value of the two challenge values retrieved from the first challenge column in the database specification, and a second challenge value of the two challenge values retrieved from the second challenge column in the database specification;
comparing, by the server, the two challenge values identified from the challenge columns to the validation values specified by the update query;
determining, by the server, matches between the two challenge values identified from the challenge columns and the validation values specified by the update query; and
validating, by the server, the update query for execution in response to the matches between the two challenge values and the validation values.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing content in a database includes identifying a challenge column associated with a database column referenced in an update query. A challenge value for the challenge column may be received and resolved for a match with a corresponding value stored in the challenge column. In case of a match, the update query may be certified for execution on the database, otherwise, the update query may be prevented from executing. Challenge columns may be determined by an analysis of the database on the basis of discriminating power, description complexity, and/or diversity.
-
Citations
19 Claims
-
1. A method for accessing a database, comprising:
-
receiving, by a server, an update query associated with the database, the update query sent from a client device requesting an update to the database, the update query specifying a column in the database and validation values for authenticating the update requested to the database; querying, by the server, a database specification for the column specified by the update query, the database specification electronically associating challenge columns in challenge tables to columns in the database; identifying, by the server, a first challenge column of the challenge columns in the database specification that is electronically associated to the column specified by the update query; identifying, by the server, a second challenge column of the challenge columns in the database specification that is electronically associated to the column specified by the update query; identifying, by the server, two challenge values from the challenge columns, a first challenge value of the two challenge values retrieved from the first challenge column in the database specification, and a second challenge value of the two challenge values retrieved from the second challenge column in the database specification; comparing, by the server, the two challenge values identified from the challenge columns to the validation values specified by the update query; determining, by the server, matches between the two challenge values identified from the challenge columns and the validation values specified by the update query; and validating, by the server, the update query for execution in response to the matches between the two challenge values and the validation values. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system, comprising:
-
a computer processor; and a memory device, the memory device storing instructions, the instructions when executed cause the computer processor to perform operations, the operations comprising; receiving an update query associated with a database, the update query sent from a client device requesting an update to the database, the update query specifying a column in the database and validation values for authenticating the update requested to the database; querying a database specification for the column specified by the update query, the database specification electronically associating challenge columns in challenge tables to columns in the database; identifying the challenge columns in the database specification that are electronically associated to the column specified by the update query; randomly selecting a first challenge column of the challenge columns identified in the database specification that is electronically associated to the column specified by the update query; randomly selecting a first challenge value from the first challenge column randomly selected from the challenge columns; randomly selecting a second challenge column of the challenge columns identified in the database specification that is electronically associated to the column specified by the update query; randomly selecting a second challenge value from the second challenge column randomly selected from the challenge columns; comparing the first challenge value randomly selected from the first challenge column and the second challenge value randomly selected from the second challenge column to the validation values specified by the update query; determining matches between the first challenge value and the second challenge value and the validation values specified by the update query; and validating the update query for execution in response to the matches. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable medium storing instructions which, when executed by a computer processor, cause the computer processor to perform operations, the operations comprising:
-
receiving an update query associated with a database, the update query sent from a client device requesting an update to the database, the update query specifying a column of the database and validation values for authenticating the update requested by the client device; querying a database specification for the column specified by the update query, the database specification electronically associating challenge columns in challenge tables to columns in the database; identifying the challenge columns in the database specification that are electronically associated to the column specified by the update query; randomly selecting a first challenge column of the challenge columns identified in the database specification that is electronically associated to the column specified by the update query; randomly selecting a first challenge value from the first challenge column randomly selected from the challenge columns; randomly selecting a second challenge column of the challenge columns identified in the database specification that is electronically associated to the column specified by the update query; randomly selecting a second challenge value from the second challenge column randomly selected from the challenge columns; comparing the first challenge value randomly selected from the first challenge column and the second challenge value randomly selected from the second challenge column to the validation values specified by the update query; determining matches between the first challenge value and the second challenge value and the validation values; and validating the update query for execution in response to the matches. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification