会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明申请
    • SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE
    • 基于语音数字签名服务的系统与方法
    • US20130006642A1
    • 2013-01-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L17/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。
    • 22. 发明授权
    • System and method for adaptive data masking
    • 用于自适应数据屏蔽的系统和方法
    • US08306932B2
    • 2012-11-06
    • US12384776
    • 2009-04-08
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • G06F15/18G06N3/00
    • G06N3/0427G06N3/08
    • A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    • 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。
    • 23. 发明申请
    • METHOD FOR MONEY TRANSFER USING A MOBILE DEVICE
    • 使用移动设备进行货币转移的方法
    • US20110099107A1
    • 2011-04-28
    • US12814568
    • 2010-06-14
    • Ashutosh SaxenaMeena Dilip Singh
    • Ashutosh SaxenaMeena Dilip Singh
    • G06Q40/00
    • G06Q20/223G06Q20/108G06Q20/32G06Q20/3223
    • A method and system to mobile based money transaction across different transaction entity. A non-repudiable message, using a first mobile device, is sent to a first transaction entity expressing to provide a token wherein the mobile device is registered with the first transaction entity. The first transaction entity provides a generated token to the first mobile device using non-repudiable messaging services. The first mobile, in turn, transfers the non-repudiable message to a second mobile device of a second user including a token and a transaction entity code. The second mobile device sends the non-repudiable message to a second transaction entity, indicating a token number, a transaction entity code, and sum of money being transferred. The second transaction entity advances the token number, via a non-repudiable message, to a transaction entity indicated by the transaction code to authenticate the token. The first transaction entity authenticates token on receiving from second transaction entity and money being transferred for genuine token as indicated by first transaction machine. Alternatively, the second transaction entity transfers the equivalent sum of money to the first transaction entity indicating money should be transferred to the linked account of the token.
    • 跨越不同交易实体的基于移动的货币交易的方法和系统。 使用第一移动设备的不可否认消息被发送到表示提供令牌的第一交易实体,其中移动设备向第一交易实体注册。 第一个事务实体使用不可否认的消息服务向第一移动设备提供生成的令牌。 第一移动装置又将不可斥责的消息传送到包括令牌和交易实体代码的第二用户的第二移动设备。 第二移动设备将不可斥责的消息发送到第二交易实体,指示令牌号码,交易实体代码和正在传送的金额的总和。 第二交易实体通过不可斥责的消息将令牌号码递交到由交易代码指示的交易实体来认证令牌。 第一交易实体在从第二交易实体接收到的令牌和第一交易机所指示的兑换正币的货币时进行认证。 或者,第二交易实体将等值的金额转移给第一交易实体,指示货币应该被转移到令牌的链接帐户。
    • 24. 发明申请
    • METHOD FOR PASSWORD BASED AUTHENTICATION TRUST GENERATION AND AUTHORIZATION THEREOF
    • 基于密码的认证信任产生及授权方法
    • US20100064365A1
    • 2010-03-11
    • US12539703
    • 2009-08-12
    • Tiruvengalam KanduriAshutosh Saxena
    • Tiruvengalam KanduriAshutosh Saxena
    • G06F21/00
    • G06F21/31
    • A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score for the second password on summing the generating value, combining trust levels of multiple users to attain a higher trust level in aggregate, and obtaining access in a service if the aggregated trust level of users are equal to or more than the predetermined trust level of the service. The present technique provides flexibility of authenticating and authorizing a user to access in a service to perform desirable functions thereon. The present technique eliminates the requirement of tokens, pins, dongles etc while attaining a higher trust level to perform a task which belongs to a higher trust level.
    • 提供了一种方法和系统来授权用户访问较高信任级别的服务。 该方法包括以下步骤:定义第一密码,为用户分配第二密码,在操作排他性关系时生成第二密码的每个组成成分的值,在求和生成值时计算第二密码的分数,组合信任级别 多个用户聚合获得更高的信任级别,如果用户的聚合信任级别等于或大于服务的预定信任级别,则获得服务中的访问。 本技术提供了认证和授权用户访问服务以在其上执行所需功能的灵活性。 本技术消除了对令牌,引脚,加密狗等的要求,同时获得更高的信任级别来执行属于更高信任级别的任务。
    • 25. 发明申请
    • System and method for adaptive data masking
    • 用于自适应数据屏蔽的系统和方法
    • US20090281974A1
    • 2009-11-12
    • US12384776
    • 2009-04-08
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • G06N3/08G06F15/18G06F17/30
    • G06N3/0427G06N3/08
    • A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    • 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。
    • 27. 发明授权
    • Methods for authenticating a user without personal information and devices thereof
    • 用于认证没有个人信息的用户的方法及其装置
    • US08516563B2
    • 2013-08-20
    • US13218515
    • 2011-08-26
    • Ashutosh SaxenaHarigopal K. B. Ponnapalli
    • Ashutosh SaxenaHarigopal K. B. Ponnapalli
    • G06F7/04G06F17/30G06F12/14G06F15/16
    • G06F21/31H04L63/08
    • A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.
    • 在没有个人信息的情况下认证用户的方法,非暂时性计算机可读介质和装置包括在安全认证计算设备处获取上下文标识符,分配给客户端计算设备的多个字符串生成器模块之一的注册标识符 访问和由客户端计算设备生成的客户端字符串,请求从与请求访问的客户端计算设备相关联的代理计算设备进行访问。 基于所获得的上下文标识符和提供给客户计算设备的多个字符串生成器模块中的相应一个,基于注册标识符来请求访问,生成认证字符串。 当客户端字符串匹配认证字符串时,由客户端计算设备请求的访问被授予安全认证计算设备。
    • 30. 发明申请
    • SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES
    • 通过移动设备的软件许可控制
    • US20080262968A1
    • 2008-10-23
    • US12055290
    • 2008-03-25
    • Ashutosh SaxenaHarigopal K. B. Ponnapalli
    • Ashutosh SaxenaHarigopal K. B. Ponnapalli
    • G06Q99/00H04L9/32
    • G06F21/10
    • Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application.
    • 公开了用于控制软件应用的许可证的方法和系统。 方法和系统可以包括请求中央许可服务器进行软件应用程序的至少一个用户的初始验证和认证,并将识别应用从中央许可服务器发送到第一设备或第二设备中的至少一个。 可以在第一设备或第二设备中生成许可标识符,并发送到中央许可服务器。 中央许可服务器可以通过发送许可证密钥生成程序来生成动态密钥来进行响应。 可以在第二设备中输入动态密钥来执行软件应用。