CELL-BASED SECURITY REPRESENTATION FOR DATA ACCESS Russian patent published in 2013 - IPC G06F21/62 G06F21/30 

Abstract RU 2501083 C2

FIELD: information technology.

SUBSTANCE: computer-implemented data security system, having a memory device storing computer-executed components which include: a definition component for defining cell level security attributes for cells of a data table, having rows and columns, wherein cell level security attributes for a cell located in a row, having one or more other cells, and in a column, having one or more other cells, may be defined to block access to data of that cell, but grant access to data of other cells in that row and data of other cells in that column; a storage component for storing cell level security attributes as security metadata, and a security component for applying the security metadata to results of a query from a user to return filtered results based on said user, and a processor for executing said computer-executed components stored in memory.

EFFECT: providing selective restriction of access to data.

20 cl, 10 dwg

Similar patents RU2501083C2

Title Year Author Number
DETECTABILITY AND LISTING MECHANISM IN HIERARCHICALLY PROTECTED DATA STORAGE SYSTEM 2006
  • Khanter Dzhejson T.
  • Dubkhashi Kedarnatkh A.
  • Skaria Sajmon
RU2408070C2
METHOD, SYSTEM AND COMPUTER DEVICE FOR PROVIDING COMMUNICATION SERVICES BETWEEN RESOURCES IN COMMUNICATION NETWORKS AND INTERNET TO PERFORM TRANSACTIONS 2002
  • Serebrennikov Oleg Aleksandrovich
RU2273107C2
CONSTRUCTING QUERIES FOR EXECUTION OVER MULTI-DIMENSIONAL DATA STRUCTURES 2014
  • Khyuz Gregori
  • Koulson Majkl Dzh.
  • St-Sir Aleksandr Tristan
  • Mokhamud Fajsal
  • Palmer-Boroski Tereza
  • Shiperski Klemens
  • Dumitru Marius
RU2679977C1
SAFETY IN APPLICATIONS OF EQUIVALENT NODES SYNCHRONISATION 2006
  • Dzhkhaveri Vivek Dzhavakhir
  • Novik Lev
RU2421799C2
METHOD, SYSTEM AND DEVICE FOR OPENING WORKBOOK REGIONS AS DATA SOURCE 2005
  • Netts Amir
  • Petkulesku Kristian
  • Behttadzhin Dehniel K.
  • Megiddo Ehran
  • Asnash Liviu
RU2406147C2
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE 2012
  • Voronkov Konstantin Pavlovich
  • Deshevykh Stepan Nikolaevich
  • Jablokov Viktor Vladimirovich
RU2523113C1
SPLIT DOWNLOAD FOR ELECTRONIC SOFTWARE DOWNLOAD 2006
  • Khatton Jork R.
  • Blekli Kristofer S.
  • Sikka Adzhaj
  • Neult Danial Dzh.
RU2424552C2
METHOD AND SYSTEM FOR CARRYING OUT TRANSACTIONS IN NETWORK USING NETWORK IDENTIFIERS 2003
  • Serebrennikov Oleg Aleksandrovich
RU2376635C2
MANAGING USER ACCESS TO OBJECTS 2007
  • Sterms Dzhejms Richard
  • Rakhamimov Dennis
  • Van Tszyi
RU2430413C2
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS 2020
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya
RU2807463C2

RU 2 501 083 C2

Authors

Jang Mark

Amirov Anton

Tang Dzhonatan

Dates

2013-12-10Published

2009-04-13Filed