会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • System and method for deletion of data in a remote computing platform
    • 用于在远程计算平台中删除数据的系统和方法
    • US08504532B2
    • 2013-08-06
    • US13241946
    • 2011-09-23
    • Ashutosh SaxenaMithun Paul
    • Ashutosh SaxenaMithun Paul
    • G06F17/00
    • G06F21/62G06F21/6245G06F2221/2143
    • Embodiments of a system and method to perform a secure deletion of a set of data from a remote cloud computing system are described. As described, in some embodiments, a user of a cloud computing service that provides data storage may securely delete his stored set of data by acquiring elevated access privileges to the stored set of data, designating at least one most significant bit in at least one data block therein as a sentinel and recording its value and position, updating the value of the sentinels and thereby rendering the data unusable, and verifying the success of the operation by checking the new value of the sentinels against the original value. In some embodiments, the verification process may be repeated in order to ensure that the data has been rendered useless across all nodes of the remote cloud platform.
    • 描述了从远程云计算系统执行安全删除一组数据的系统和方法的实施例。 如所描述的,在一些实施例中,提供数据存储的云计算服务的用户可以通过获取对存储的数据集的提升的访问权限来安全地删除他存储的数据集,指定至少一个数据中的至少一个最高有效位 在其中作为哨兵并记录其值和位置,更新哨兵的值,从而使数据不可用,并通过根据原始值检查哨兵的新值来验证操作的成功。 在一些实施例中,可以重复验证过程,以确保在远程云平台的所有节点上数据已经变得无用。
    • 13. 发明授权
    • Method for password based authentication trust generation and authorization thereof
    • 基于密码的认证信任生成和授权方法
    • US08464339B2
    • 2013-06-11
    • US12539703
    • 2009-08-12
    • Tiruvengalam KanduriAshutosh Saxena
    • Tiruvengalam KanduriAshutosh Saxena
    • H04L29/06
    • G06F21/31
    • A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score for the second password on summing the generating value, combining trust levels of multiple users to attain a higher trust level in aggregate, and obtaining access in a service if the aggregated trust level of users are equal to or more than the predetermined trust level of the service. The present technique provides flexibility of authenticating and authorizing a user to access in a service to perform desirable functions thereon. The present technique eliminates the requirement of tokens, pins, dongles etc. while attaining a higher trust level to perform a task which belongs to a higher trust level.
    • 提供了一种方法和系统来授权用户访问较高信任级别的服务。 该方法包括以下步骤:定义第一密码,为用户分配第二密码,在操作排他性关系时生成第二密码的每个组成成分的值,在求和生成值时计算第二密码的分数,组合信任级别 多个用户聚合获得更高的信任级别,如果用户的聚合信任级别等于或大于服务的预定信任级别,则获得服务中的访问。 本技术提供了认证和授权用户访问服务以在其上执行所需功能的灵活性。 本技术消除了令牌,引脚,加密狗等的需求,同时获得更高的信任级别来执行属于更高信任级别的任务。
    • 17. 发明授权
    • System and method for voice based digital signature service
    • 基于语音的数字签名服务的系统和方法
    • US08744858B2
    • 2014-06-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L21/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。
    • 19. 发明授权
    • Method and system for adaptive vulnerability scanning of an application
    • 应用程序的自适应漏洞扫描的方法和系统
    • US08839441B2
    • 2014-09-16
    • US12858884
    • 2010-08-18
    • Ashutosh SaxenaManeesh PonnathVishal Anjaiah Gujjary
    • Ashutosh SaxenaManeesh PonnathVishal Anjaiah Gujjary
    • G06F11/00G06F21/57
    • G06F21/577
    • A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
    • 提供了一种应用的自适应漏洞扫描(AVS)的方法和系统。 应用程序的自适应漏洞扫描有助于动态识别新的漏洞。 使用预定义的一组规则扫描应用程序的端点。 随后,提出了一个或多个可能的漏洞。 分析漏洞并修改预定义规则。 迭代重复扫描应用程序和修改规则的步骤,直到实现自适应漏洞扫描功能。 神经网络用于训练自适应漏洞扫描器。 这个神经网络是在进行训练阶段的基础上,基于预定义的规则集来学习一些规则。 改变神经网络中的至少一个权重,同时赋予自学习能力。
    • 20. 发明申请
    • SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE
    • 基于语音数字签名服务的系统与方法
    • US20130006642A1
    • 2013-01-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L17/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。