Cool ice column profiling
First Claim
1. In a data processing environment having a user terminal with a user-id for generating a service request for access to a first data column within a first data table responsively coupled to a data base management system via a publically accessible digital data network having at least one data base having a plurality of data tables wherein said first data table contains at least one data column wherein said at least one data column includes said first data column, the improvement comprising:
- a. an administration terminal responsively coupled to said data base management system whereat an administrator assigns a security profile corresponding to said user-id; and
b. wherein said security profile corresponding to said user-id permits said user terminal to access the entirety of said first data column of said first data table if and only if said security profile corresponds to access to said first data column of said first data table.
5 Assignments
0 Petitions
Accused Products
Abstract
An apparatus for and method of utilizing an internet terminal coupled to the world wide web to access an existing proprietary data base management system having a dialog-based request format. The user request is received by a web server from the world wide web and converted into one or more sequenced data base management commands stored as corresponding to the service request. A security profile, if necessary, is also stored with the one or more sequenced data base management commands based upon the specific data columns within the specific data tables within the data base which must be accessed to honor the service request. The security profile is compared to the user-id of the requester. If a match is found, the data base management commands are sequentially presented to the data base management system and the intermediate products stored. After all of the sequenced data base management commands have been executed, the web server combines the intermediate products to form a complete response to the initial user request. The response is transferred to the user over the world wide web. If the user-id and security profile do not match, the service request is not executed and an error response is provided to the user.
8 Citations
20 Claims
-
1. In a data processing environment having a user terminal with a user-id for generating a service request for access to a first data column within a first data table responsively coupled to a data base management system via a publically accessible digital data network having at least one data base having a plurality of data tables wherein said first data table contains at least one data column wherein said at least one data column includes said first data column, the improvement comprising:
-
a. an administration terminal responsively coupled to said data base management system whereat an administrator assigns a security profile corresponding to said user-id; and
b. wherein said security profile corresponding to said user-id permits said user terminal to access the entirety of said first data column of said first data table if and only if said security profile corresponds to access to said first data column of said first data table. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
-
a. a user terminal having a user-id;
b. a data base management system having access to a data base with a plurality of data columns within each of a plurality of data tables responsively coupled to said user terminal via a publically accessible digital data communication network;
c. an administration terminal whereat an administrator assigns a security profile to said user terminal corresponding to said user-id; and
d. wherein said data ba se management system provides access to a particular one of said plurality of data columns within a particular one of said plurality of data tables of said data base by said user terminal if and only if said security profile corresponds to access to said particular one of said plurality of data columns within said particular one of said plurality of data tables. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of utilizing a user terminal having a user-id to access a remote data base management system via a publically accessible digital data communication network having a data base with a plurality of data tables comprising:
-
a. defining a service request by an administrator via an administration terminal;
b. assigning a security profile to said service request;
c. transmitting said service request requiring access to a one of said plurality of data tables from said user terminal;
d. receiving said service request by said remote data base management system;
e. accessing said security profile corresponding to said service request by an administration module;
f. comparing said security profile with said user-id within said administration module; and
g. honoring said service request if and only if said user-id corresponds to said security profile. - View Dependent Claims (12, 13, 14, 15)
-
-
16. An apparatus comprising:
-
a. means having a user-id for permitting a user to interact via a publically accessible digital data communication network with a data column within a data table of a digital data base having a plurality of data columns within a plurality of data tables using a service request;
b. means responsively coupled to said permitting means for offering data processing services involving access to said data column to said user in response to said service request;
c. means responsively coupled to said offering means for preventing said offering means from said offering data processing services to said user in response to said service request unless said user-id corresponds to a security profile previously defined by an administrator via an administration terminal wherein said security profile permits access to said data column. - View Dependent Claims (17, 18, 19, 20)
-
Specification