会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method and apparatus for manipulating data within a remote database in a multiple tier environment
    • 用于在多层环境中操纵远程数据库内的数据的方法和装置
    • US07725459B2
    • 2010-05-25
    • US11290494
    • 2005-12-01
    • Shivram GanduriJames W. Pickel
    • Shivram GanduriJames W. Pickel
    • G06F17/30G06F7/00
    • G06F9/547H04L67/1002H04L67/1008H04L67/28Y10S707/99933
    • An embodiment of the present invention enables manipulation of data on a remote server and ensures uniqueness of data identifiers in a multi-tier environment, where a database client communicates through one or more intermediate servers to reach the target server containing the remote database. In particular, a client system transmits a query to the target server via a gateway system and receives a handle or data reference and a query identification for subsequent manipulation of data residing on that target server. A new query identification is generated by the gateway system and mapped with the query identification of the intended target server. When the client system transmits a query with the gateway query identification, the gateway system performs a lookup operation to identify the corresponding target server and subsequently forwards the query and target server query identification to the identified target server for processing.
    • 本发明的实施例能够操纵远程服务器上的数据,并确保数据库客户端通过一个或多个中间服务器进行通信以到达包含远程数据库的目标服务器的多层环境中的数据标识符的唯一性。 特别地,客户端系统经由网关系统向目标服务器发送查询,并接收句柄或数据引用以及查询标识,用于后续操作驻留在该目标服务器上的数据。 新的查询标识由网关系统生成,并与目标服务器的查询标识进行映射。 当客户端系统发送具有网关查询标识的查询时,网关系统执行查找操作以识别对应的目标服务器,随后将查询和目标服务器查询标识转发到所识别的目标服务器进行处理。
    • 7. 发明申请
    • ENCRYPTION OF SECURITY-SENSITIVE DATA BY RE-USING A CONNECTION
    • 通过重新使用连接来加密安全敏感数据
    • US20110055563A1
    • 2011-03-03
    • US12912652
    • 2010-10-26
    • Gayathiri R. ChandranJames W. PickelMichael R. Springgay
    • Gayathiri R. ChandranJames W. PickelMichael R. Springgay
    • H04L9/32
    • H04L9/0891H04L63/0428H04L63/06H04L63/104H04L63/20
    • Techniques are provided for processing data. Connections having different security properties are stored, wherein each of the connections allows applications at the client computer to access data sources at a server computer. A request is received from an application to access a data source, wherein the request has associated security properties. In response to the client computer requesting establishment of a connection on behalf of the application, it is determined whether there is a stored connection that used a same set of security properties as are associated with the request from the application and that connected to the data source that the application requests access to. In response to determining that there is a stored connection that used the same set of security properties and that connected to the data source, the connection and an associated client encryption seed, client encryption token, server encryption seed, and server encryption token are re-used. In response to determining that there is not a connection that used the same set of security properties and that connected to the data source, a new client connection key, client encryption seed, client encryption token, sever connection key, server encryption seed, and server encryption token are generated.
    • 提供了处理数据的技术。 存储具有不同安全属性的连接,其中每个连接允许客户端计算机上的应用访问服务器计算机上的数据源。 从应用程序接收到访问数据源的请求,其中所述请求具有相关联的安全属性。 响应于客户端计算机代表应用程序请求建立连接,确定是否存在使用与来自应用的请求相关联并且连接到数据源的相同的一组安全属性的存储连接 应用程序请求访问。 响应于确定存在使用相同的一组安全属性并连接到数据源的存储连接,连接和关联的客户机加密种子,客户端加密令牌,服务器加密种子和服务器加密令牌被重新连接, 用过的。 响应于确定没有使用相同的一组安全属性并连接到数据源的连接,新的客户端连接密钥,客户端加密种子,客户端加密令牌,服务器连接密钥,服务器加密种子和服务器 生成加密令牌。
    • 10. 发明授权
    • Encryption of security-sensitive data by re-using a connection
    • 通过重新使用连接来加密安全敏感数据
    • US08200972B2
    • 2012-06-12
    • US12912652
    • 2010-10-26
    • Gayathiri R. ChandranJames W. PickelMichael R. Springgay
    • Gayathiri R. ChandranJames W. PickelMichael R. Springgay
    • H04L9/32
    • H04L9/0891H04L63/0428H04L63/06H04L63/104H04L63/20
    • Techniques are provided for processing data. Connections having different security properties are stored, wherein each of the connections allows applications at the client computer to access data sources at a server computer. A request is received from an application to access a data source, wherein the request has associated security properties. In response to the client computer requesting establishment of a connection on behalf of the application, it is determined whether there is a stored connection that used a same set of security properties as are associated with the request from the application and that connected to the data source that the application requests access to. In response to determining that there is a stored connection that used the same set of security properties and that connected to the data source, the connection and an associated client encryption seed, client encryption token, server encryption seed, and server encryption token are re-used. In response to determining that there is not a connection that used the same set of security properties and that connected to the data source, a new client connection key, client encryption seed, client encryption token, sever connection key, server encryption seed, and server encryption token are generated.
    • 提供了处理数据的技术。 存储具有不同安全属性的连接,其中每个连接允许客户端计算机上的应用访问服务器计算机上的数据源。 从应用程序接收到访问数据源的请求,其中所述请求具有相关联的安全属性。 响应于客户端计算机代表应用程序请求建立连接,确定是否存在使用与来自应用的请求相关联并且连接到数据源的相同的一组安全属性的存储连接 应用程序请求访问。 响应于确定存在使用相同的一组安全属性并连接到数据源的存储连接,连接和关联的客户机加密种子,客户端加密令牌,服务器加密种子和服务器加密令牌被重新连接, 用过的。 响应于确定没有使用相同的一组安全属性并连接到数据源的连接,新的客户端连接密钥,客户端加密种子,客户端加密令牌,服务器连接密钥,服务器加密种子和服务器 生成加密令牌。