Managing privileges to access data in a database
A database and data technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve problems such as data movement challenges that cannot be solved
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] A system represents one or more associated devices with common memory and a processor working together to provide a particular functionality, which may include hardware such as a computer, components such as peripherals, and associated software such as applications. Authorization represents the data access rights agreed in the license contract between the consumer and the data provider system. The User may work with the Data Custodian or Agent / Partner to establish Authentication Credentials to allow license certificates and data package requests from End User systems, or the Data Custodian or Agent / Partner may issue Authentication Credentials. Authentication is the act of determining that an end-user system should be authorized to act on behalf of a particular user. Authorization means that the system or device has certain rights required to perform its role, and that it has successfully authenticated the system or device with which it communicates.
[0020] figure 1 ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


