FIELD: information technology.
SUBSTANCE: invention relates to computer systems and methods for providing secure access to a database. Technical result is achieved due to that preset allowed IP addresses, HWID numbers and roles of users of structural elements of automated system in form of sets of IPallow={IP1, IP2, …, IPn}, Hallow={H1, H2, …, Hn} and Rallow={R1, R2, …, Rm} for high verification of access rights to the database, and after receiving information including a request and a user context, comparing IP addresses, HWID numbers and user roles from the user context with multiple allowed IP addresses, HWID numbers and user roles in the storage device. In case if at least one of conditions is not satisfied, then an alarm signal is generated and information is output in compliance with access right, and when all conditions are met, the selection of the row to be considered when constructing the query result, and in the absence of rows in the DB table, the result of the request is converted in accordance with the specified conversion function F(x) by the key X and the result of the request is output in accordance with the access right in the encoded form.
EFFECT: high level of protecting access to a database while reducing computational load on a database.
1 cl, 9 dwg
Authors
Dates
2019-12-17—Published
2019-03-04—Filed