Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Achieving Out-of-the-box Fine-Grained Access Control in Databases by enforcing and embedding Next Generation Access Control (m-NGAC) right in databases

Published Patent Application Number: 2024/0265125

Achieving Out-of-the-box Fine-Grained Marketing Sheet Thumbnail
Credit: TPO

SQL databases traditionally lack a robust fine-grained (cell level) access control system. While some newer vendor solutions have emerged in recent years, none offer a comprehensive, globally adopted approach to address this issue. In current software practices, access control is often implemented in the middle or front-end tiers, which is inefficient because data security should ideally be enforced where the data resides. Access control should be applied directly at the database level to ensure protection, regardless of how the data is accessed.

Invention

m-NGAC brings a global solution for RDBMSs by enabling automatic installation of Next Generation Access Control (NGAC) directly into the database, offering out-of-the-box fine-grained database access control. NGAC facilitates building and storing Access control policies, which will be then accessed and enforced by m-NGAC for every incoming SQL query that reads or modifies data. Whether it is a client software or a SQL editor, no data can be accessed bypassing policy. 

Applications/Industries

Out-of-the-box access control provides several significant benefits for commercial applications: 1. Reduced Development Effort: Developers no longer need to implement access control at the software level, significantly saving time and reducing costs for organizations. 2. Enhanced Data Security: Data is fully secured at the database level, ensuring that even database administrators (DBAs) using SQL editors have controlled, policy-driven access. 3. Centralized Policy Enforcement: With centralized enforcement of access control policies, multiple software applications can share the same data while maintaining consistent access control.

Market

1. The NGAC-aware database provides fine-grained access control directly, ensuring secure data retrieval. 2. Access control at the application level becomes unnecessary, simplifying development. 3. Centralized enforcement of access control policies enhances consistency and security. 4. Even database administrators (DBAs) using SQL editors will have controlled, policy-driven access.

Created April 14, 2025