会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • System and method for voice based digital signature service
    • 基于语音的数字签名服务的系统和方法
    • US08744858B2
    • 2014-06-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L21/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。
    • 2. 发明申请
    • METHOD AND SYSTEM FOR ADAPTIVE VULNERABILITY SCANNING OF AN APPLICATION
    • 适用于自适应扫描的方法和系统
    • US20110321164A1
    • 2011-12-29
    • US12858884
    • 2010-08-18
    • Ashutosh SAXENAManeesh PONNATHVishal Anjaiah GUJJARY
    • Ashutosh SAXENAManeesh PONNATHVishal Anjaiah GUJJARY
    • G06F21/00
    • G06F21/577
    • A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
    • 提供了一种应用的自适应漏洞扫描(AVS)的方法和系统。 应用程序的自适应漏洞扫描有助于动态识别新的漏洞。 使用预定义的一组规则扫描应用程序的端点。 随后,提出了一个或多个可能的漏洞。 分析漏洞并修改预定义规则。 迭代重复扫描应用程序和修改规则的步骤,直到实现自适应漏洞扫描功能。 神经网络用于训练自适应漏洞扫描器。 这个神经网络是在进行训练阶段的基础上,基于预定义的规则集来学习一些规则。 改变神经网络中的至少一个权重,同时赋予自学习能力。
    • 3. 发明授权
    • Method and system for adaptive vulnerability scanning of an application
    • 应用程序的自适应漏洞扫描的方法和系统
    • US08839441B2
    • 2014-09-16
    • US12858884
    • 2010-08-18
    • Ashutosh SaxenaManeesh PonnathVishal Anjaiah Gujjary
    • Ashutosh SaxenaManeesh PonnathVishal Anjaiah Gujjary
    • G06F11/00G06F21/57
    • G06F21/577
    • A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
    • 提供了一种应用的自适应漏洞扫描(AVS)的方法和系统。 应用程序的自适应漏洞扫描有助于动态识别新的漏洞。 使用预定义的一组规则扫描应用程序的端点。 随后,提出了一个或多个可能的漏洞。 分析漏洞并修改预定义规则。 迭代重复扫描应用程序和修改规则的步骤,直到实现自适应漏洞扫描功能。 神经网络用于训练自适应漏洞扫描器。 这个神经网络是在进行训练阶段的基础上,基于预定义的规则集来学习一些规则。 改变神经网络中的至少一个权重,同时赋予自学习能力。
    • 4. 发明申请
    • SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE
    • 基于语音数字签名服务的系统与方法
    • US20130006642A1
    • 2013-01-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L17/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。
    • 5. 发明授权
    • System and method for adaptive data masking
    • 用于自适应数据屏蔽的系统和方法
    • US08306932B2
    • 2012-11-06
    • US12384776
    • 2009-04-08
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • G06F15/18G06N3/00
    • G06N3/0427G06N3/08
    • A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    • 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。
    • 6. 发明申请
    • System and method for adaptive data masking
    • 用于自适应数据屏蔽的系统和方法
    • US20090281974A1
    • 2009-11-12
    • US12384776
    • 2009-04-08
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • G06N3/08G06F15/18G06F17/30
    • G06N3/0427G06N3/08
    • A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    • 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。