Ex Parte Fukumoto - Page 2



         Appeal No. 2006-2936                                                       
         Application No. 10/013,714                                                 
                                     Invention                                      
         Appellant’s invention relates generally to a method and                    
         system for controlling the installation of an externally acquired          
         software program (P) in a computer (10) before said program is             
         authorized to access a database (13) located on said computer              
         (10).  Upon receipt of a request from the program (P) indicating           
         a desire to access the database (13), a safety checker (11a)               
         reviews the program, and issues a certificate verifying that the           
         program is safe to be installed on the computer (10).  If the              
         certificate indicates that the program is very safe, a data                
         access permission setting manager (11b) assigns a “high access             
         permission setting” to the program with unrestricted access to             
         the database (13). In contrast, if the certificate indicates that          
         the program is not totally safe, the database access permission            
         manager (11b) assigns a “low access permission setting” to the             
         program restricting its access only to low security level data.            
              Claim 1 is representative of the claimed invention and is             
         reproduced as follows:                                                     
              1.  A database access control method of controlling access            
         to a database in a database device executing a program which               
         accesses a database, comprising the steps of:                              
              (a) making a data access permission setting for the program           
         which accesses the database storing sets of data for each of               
         which a security level setting is made; and                                

                                         2                                          




Page:  Previous  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  Next 

Last modified: November 3, 2007