Method for establishing secured views for a database
A database and view technology, applied in data processing applications, electronic digital data processing, computer security devices, etc., can solve problems such as database vulnerability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] While the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the conclusion of this patent. The detailed description is exemplary only and does not describe all possible embodiments, since describing all possible embodiments would be impractical, if not impossible. Numerous alternative embodiments could be implemented using current technology or technology developed before the filing of this application, which would still fall within the scope of the claims.
[0022] It is also understood that unless the sentence "As used herein, the term '__' is defined herein to mean..." or similar sentences does not expressly or by implication limit the meaning of a term beyond its ordinary or ordinary meaning, And such terms should not be construed as limiting the scope based on any statement made in any part of this patent (other than t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 