会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 42. 发明授权
    • Method and system for controlling access to data via a data-centric security model
    • 通过数据为中心的安全模型控制数据访问的方法和系统
    • US07890530B2
    • 2011-02-15
    • US12025832
    • 2008-02-05
    • Michael P. BilgerHyman D. ChantzNevenko Zunic
    • Michael P. BilgerHyman D. ChantzNevenko Zunic
    • G06F17/00
    • G06F21/6227G06F21/6218
    • A method and system for controlling access to data via a data-centric security model. A business data classification scheme is defined as a hierarchy that includes data types aligned with business operations. A data element is labeled with a data label. The data label includes multiple attributes associated with a data-centric security model. A first attribute is a data type of the data element. A second attribute includes security requirements. Data control rules are automatically generated for an enforcement of the security requirements. The enforcement grants or denies to a user an access to the data element via a predefined action. The enforcement is based on a predefined association among the predefined action, a predefined role that includes the user, the data type and, optionally, a purpose for performing the predefined action.
    • 一种通过数据为中心的安全模型来控制对数据访问的方法和系统。 业务数据分类方案被定义为包括与业务操作对齐的数据类型的层次结构。 数据元素用数据标签标记。 数据标签包括与以数据为中心的安全模型相关联的多个属性。 第一个属性是数据元素的数据类型。 第二个属性包括安全性要求。 自动生成数据控制规则,以执行安全性要求。 执行授权或拒绝用户通过预定义的操作访问数据元素。 执行基于预定义动作之间的预定义关联,包括用户的预定义角色,数据类型以及可选地用于执行预定义动作的目的。
    • 43. 发明申请
    • SOA LIFECYCLE GOVERNANCE AND MANAGEMENT
    • SOA生活管理与管理
    • US20100250295A1
    • 2010-09-30
    • US12410497
    • 2009-03-25
    • Kishore ChannabasavaiahSri RamanathanMatthew B. TrevathanRaghu VaradanNevenko Zunic
    • Kishore ChannabasavaiahSri RamanathanMatthew B. TrevathanRaghu VaradanNevenko Zunic
    • G06Q10/00
    • G06Q10/063G06Q10/06
    • Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for implementing a service-oriented architecture governance framework. A programmable device configured by a logic component identifies a gap within a service-oriented architecture service orientation enterprise of concern as a function of a service-oriented architecture governance dimension. The service-oriented architecture governance dimension may be a service-oriented architecture business and information technology alignment dimension, a service-oriented architecture ownership and decision rights dimension, a service-oriented architecture asset lifecycle enablement and management dimension or a service-oriented architecture operational management and monitoring dimension. Some methods also identify and select a process within a service-oriented architecture governance dimension applicable to an identified enterprise of concern, apply the selected process against a stage of a service-oriented architecture business service lifecycle management component of the enterprise of concern, and customize and enable a change management process and capability corresponding to the enterprise of concern.
    • 提供了包括服务方法,制造文章,系统,文章和可编程设备在内的方法,用于实现面向服务的架构治理框架。 由逻辑组件配置的可编程设备将面向服务的架构服务导向企业中的差距识别为面向服务的架构治理维度的函数。 面向服务的架构治理维度可以是面向服务的架构业务和信息技术对齐维度,面向服务的架构所有权和决策权维度,面向服务的架构资产生命周期启用和管理维度或面向服务的架构 管理和监督维度。 一些方法还可以识别和选择面向服务的架构治理维度中的过程,该维度适用于所关注的已识别企业,将所选流程应用于所关注企业的面向服务的体系结构业务服务生命周期管理组件的阶段,并自定义 实现与企业相关的变更管理流程和能力。
    • 48. 发明申请
    • METHOD AND SYSTEM FOR CONTROLLING ACCESS TO DATA VIA A DATA-CENTRIC SECURITY MODEL
    • 用于通过数据中心安全模型控制访问数据的方法和系统
    • US20090198697A1
    • 2009-08-06
    • US12025832
    • 2008-02-05
    • Michael P. BilgerHyman D. ChantzNevenko Zunic
    • Michael P. BilgerHyman D. ChantzNevenko Zunic
    • G06F17/00
    • G06F21/6227G06F21/6218
    • A method and system for controlling access to data via a data-centric security model. A business data classification scheme is defined as a hierarchy that includes data types aligned with business operations. A data element is labeled with a data label. The data label includes multiple attributes associated with a data-centric security model. A first attribute is a data type of the data element. A second attribute includes security requirements. Data control rules are automatically generated for an enforcement of the security requirements. The enforcement grants or denies to a user an access to the data element via a predefined action. The enforcement is based on a predefined association among the predefined action, a predefined role that includes the user, the data type and, optionally, a purpose for performing the predefined action.
    • 一种通过数据为中心的安全模型来控制对数据访问的方法和系统。 业务数据分类方案被定义为包括与业务操作对齐的数据类型的层次结构。 数据元素用数据标签标记。 数据标签包括与以数据为中心的安全模型相关联的多个属性。 第一个属性是数据元素的数据类型。 第二个属性包括安全性要求。 自动生成数据控制规则,以执行安全性要求。 执行授权或拒绝用户通过预定义的操作访问数据元素。 执行基于预定义动作之间的预定义关联,包括用户的预定义角色,数据类型以及可选地用于执行预定义动作的目的。
    • 49. 发明授权
    • Method and apparatus for providing interoperability between key recovery and non-key recovery systems
    • US06535607B1
    • 2003-03-18
    • US09184002
    • 1998-11-02
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • Coimbatore S. ChandersekaranRosario GennaroSarbari GuptaStephen M. Matyas, Jr.David R. SaffordNevenko Zunic
    • H04L900
    • H04L9/0841H04L9/0894
    • A method and apparatus for ensuring that a key recovery-enabled (KR-enabled) system communicating with a non-KR-enabled system in a cryptographic communication system transmits the information necessary to permit key recovery by a key recovery entity. In a first embodiment, data is encrypted under a second key K that is generated as a one-way function of a first key K′ and a key recovery block KRB generated on the first key K′. The key recovery block KRB and the encrypted data e(K, data) are transmitted to the receiver, who cannot decrypt the data without regenerating the second key K from the first key K′ and the key recovery block KRB. In a second embodiment, data is encrypted under a second key K that is generated independently of the first key K′. A third key X, generated as a one-way function of the first key K′ and a key recovery block KRB generated on the second key K, is used to encrypt the XOR product Y of the first and second keys K′, K. The key recovery block KRB, the encrypted XOR product e(X, Y) and the encrypted data e(K, data) are transmitted to the receiver, who cannot decrypt the data without regenerating the third key X from the first key K′ and the key recovery block KRB, decrypting the XOR product Y using the regenerated third key X, and recombining the XOR product Y with the first key K″ to regenerate the second key K. In a third embodiment, an integrity value is computed on a key K and its key recovery block KRB. The integrity value and the key K are encrypted to form an encrypted portion of a key exchange block KEB, while the key recovery block KRB is put in an unencrypted portion of the key exchange block KEB, which is sent along with the encrypted data e(K, data) to the receiver. The receiver decrypts the encrypted portion, recomputes the integrity value and compares it with the received integrity value. Only if the two integrity values compare is the key K extracted and used to decrypt the data.