Claims
- 1. A method of secure replication, comprising the steps of:authenticating an untrusted user; receiving a request from the authenticated untrusted user to refresh a replica of a body of data; in response to receiving the request from the authenticated untrusted user, refreshing the replica in a security domain of a trusted user; denying permission of the authenticated untrusted user to access the body of data; and granting permission of the trusted user to access the body or data.
- 2. The method of claim 1, further comprising the step of:storing metadata about the replica of the body of data, said metadata identifying an owner of the replica of the body of data.
- 3. The method of claim 2, further comprising the step of:accessing the metadata about the replica of the body of data to identity an owner of the replica of the body of data.
- 4. A method of secure replication, comprising the steps of:storing metadata about a replica of a body of data, said metadata identifying an owner of the replica of the body; authenticating an untrusted user; receiving a request from an authenticated untrusted user to refresh the replica; in response to receiving the request, comparing an identity of the authenticated untrusted user and the owner of the replica; and if the identity of the authenticated untrusted user and the owner of the replica of the body of data are same, then refreshing the replica in a security domain of a trusted user.
- 5. The method of claim 4, further comprising:granting permission to a the authenticated untrusted user only to connect to a master site and to run a refresh program.
- 6. The method of claim 5, wherein the authenticated untrusted user does not have permission to access the body of data.
- 7. A computer-readable medium bearing instructions for secure replication, said instructions arranged to perform the method of claim 5.
- 8. A computer-readable medium bearing instructions for secure replication, said instructions arranged, when executed by one or more processors, to cause the one or more processors to perform the steps of:authenticating an untrusted user; receiving a request from the authenticated untrusted user to refresh a replica of a body of data; in response to receiving the request from the authenticated untrusted user, refreshing the replica in a security domain of a trusted user; denying permission of the authenticated untrusted user to access the body of data; and granting permission of the trusted user to access the body of data.
- 9. The computer-readable medium of claim 8, wherein said instructions are further arranged to cause the one or more processors to perform the step of:storing metadata about the replica of the body of data, said metadata identifying an owner of the replica of the body of data.
- 10. The computer-readable medium of claim 9, wherein said instructions are further arranged to cause the one or more processors to perform the steps of:accessing the metadata about the replica of the body of data to identity an owner of the replica of the body of data.
- 11. A computer-readable medium bearing instructions for secure replication, said instructions arranged, when executed by one or more processors, to cause the one or more processors to perform the steps of:storing metadata about a replica of a body of data, said metadata identifying an owner of the replica of the body; authenticating an untrusted user; receiving a request from an authenticated untrusted user to refresh the replica; in response to receiving the request, comparing an identity of the authenticated untrusted user and the owner of the replica; and if the identity of the authenticated untrusted user and the owner of the replica of the body of data are same, then refreshing the replica in a security domain of a trusted user.
RELATED APPLICATIONS
The present application claims the benefit of U.S. Provisional Application No. 60/086,985 entitled “Replication for Front Office Replication” filed on May 28, 1998 by Benny Souder, Alan Downing, Harry Sun, Alan Demers, James Stamos, John Graham, and Curtis Elsbernd, the contents of which are hereby incorporated by reference herein.
The present application is related to the following commonly-assigned U.S. patent applications, the contents of all of which in their entirety are hereby incorporated by reference herein:
U.S. appliation Ser. No. 09/322,153 entitled “Data Replication for Front Office Automation” filed on May 28, 1999 by Benny Souder, Alan Downing, Harry Sun, Alan Demers, James Stamos, John C. Graham, Curtis Elsbernd, Mahesh Subramaniam, an d Wayne E. Smith which is now U.S. Pat. No. 6,532,479;
U.S. appliation Ser. No. 09/321,622 entitled “Lightweight Data Replication” filed on May 28, 1999 by Sukanya Balaraman, Alan Downing, John C. Graham, Lewis S. Kaplan, Benny Souder, and Harry Sun;
U.S. appliation Ser. No. 09/321,625 entitled “Mass Deployment of Front Office Applications” filed on May 28, 1999 by Curtis Elsbernd, Benny Souder, and Wayne E. Smith which is now U.S. Pat. No. 6,529,904; and
U.S. appliation Ser. No. 09/321,594 entitled “Schema Evolution in Replication” filed on May 28, 1999 by Alan Demers, Curtis Elsbernd, James Stamos, and Lik Wong.
US Referenced Citations (25)
Non-Patent Literature Citations (1)
Entry |
Feeney, “Security Issues and Features of Database Management Systems”, Jul. 1986, Information Age, vol. 8, #3, via dialog text search, abstract. |
Provisional Applications (1)
|
Number |
Date |
Country |
|
60/086985 |
May 1998 |
US |