System for controlling database security and access
First Claim
1. A database access control computing platform, comprising:
- at least one processor;
a communication interface communicatively coupled to the at least one processor; and
a non-transitory memory storing computer-readable instructions that, when executed by the at least one processor, cause the database access control computing platform to;
receive, from a user computing device, a request to connect to a database;
determine whether the user computing device is authorized to access the database, the determining including retrieving a unique machine identifier of the user computing device and comparing the unique machine identifier of the user computing device to a plurality of pre-registered machine identifiers;
responsive to determining that the user computing device is authorized to access the database, receive credentials from a user associated with the user computing device;
determine whether the received credentials are associated with a user who is authorized to access the database;
responsive to determining that the credentials are associated with a user who is authorized to access the database, connecting the user computing device to the database;
identify, based on the received credentials, types of data to which the user associated with the user computing device has access; and
dynamically generate a user interface for displaying portions of the database including the identified types of data on the user computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems for controlling access to a database are provided. A system may include a computing platform that may receive a request to access a database from a computing device. A unique identifier of the computing device may be compared to pre-registered device identifiers to determine whether the computing device is authorized to access the database. If not, the computing platform may prevent the computing device from accessing the database. If the computing device is authorized to access the database, the system may receive credentials from a user associated with the computing device. The system may determine whether the credentials of the user match credentials of a user authorized to access the database. If not, the system may prevent the user from accessing the database. If the user authorized to access the database, the system may determine one or more types of data the user is authorized to access.
-
Citations
21 Claims
-
1. A database access control computing platform, comprising:
-
at least one processor; a communication interface communicatively coupled to the at least one processor; and a non-transitory memory storing computer-readable instructions that, when executed by the at least one processor, cause the database access control computing platform to; receive, from a user computing device, a request to connect to a database; determine whether the user computing device is authorized to access the database, the determining including retrieving a unique machine identifier of the user computing device and comparing the unique machine identifier of the user computing device to a plurality of pre-registered machine identifiers; responsive to determining that the user computing device is authorized to access the database, receive credentials from a user associated with the user computing device; determine whether the received credentials are associated with a user who is authorized to access the database; responsive to determining that the credentials are associated with a user who is authorized to access the database, connecting the user computing device to the database; identify, based on the received credentials, types of data to which the user associated with the user computing device has access; and dynamically generate a user interface for displaying portions of the database including the identified types of data on the user computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving, from a user computing device, a request to connect to a database; determining, by a database access control server, whether the user computing device is authorized to access the database, the determining including retrieving a unique machine identifier of the user computing device and comparing the unique machine identifier to a plurality of pre-registered machine identifiers; responsive to determining that the user computing device is authorized to access the database, receiving, by the database access control server, credentials from a user associated with the user computing device; determining, by the database access control server, whether the received credentials are associated with a user who is authorized to access the database; responsive to determining that the credentials are associated with a user who is authorized to access the database, connecting the user computing device to the database; identifying, by the database access control server and based on the received credentials, types of data to which the user associated with the user computing device has access; and dynamically generating, by the database access control server, a user interface for displaying portions of the database including the identified types of data on the user computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more non-transitory computer-readable media storing instructions that, when executed by a computer system comprising at least one processor, memory, and a communication interface, cause the computer system to:
-
receive, from a user computing device, a request to connect to a database; determine whether the user computing device is authorized to access the database, the determining including retrieving a unique machine identifier of the user computing device and comparing the unique machine identifier to a plurality of pre-registered machine identifiers; responsive to determining that the user computing device is authorized to access the database, receive credentials from a user associated with the user computing device; determine whether the received credentials are associated with a user who is authorized to access the database; responsive to determining that the credentials are associated with a user who is authorized to access the database, connecting the user computing device to the database; identify, based on the received credentials, types of data to which the user associated with the user computing device has access; and dynamically generate a user interface for displaying portions of the database including the identified types of data on the user computing device. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification