会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Proactive information security management
    • 主动信息安全管理
    • US08285748B2
    • 2012-10-09
    • US12472016
    • 2009-05-26
    • John S. ThomasAravind YalamanchiIdriss MekrezMatt Topper
    • John S. ThomasAravind YalamanchiIdriss MekrezMatt Topper
    • G06F17/30
    • G06F17/30867G06F17/30522G06F21/6227
    • A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.
    • 描述了用于主动信息安全管理的方法和装置。 在一个实施例中,例如,一种用于控制对敏感信息的访问的计算机实现的方法,所述方法包括:维护可用于控制对敏感信息的访问的访问约束数据,其中访问约束数据包括匹配模式数据并应用 模式数据; 从查询器接收请求访问敏感信息的语义查询; 基于匹配模式数据,确定是否应该根据应用模式数据约束语义查询; 其中所述语义查询应根据应用模式数据进行约束,根据应用模式数据重写语义查询以产生重写查询; 对包含敏感信息的数据库执行重写的查询; 并返回执行重写查询的任何结果。
    • 2. 发明申请
    • Proactive Information Security Management
    • 主动信息安全管理
    • US20090300002A1
    • 2009-12-03
    • US12472016
    • 2009-05-26
    • John S. ThomasAravind YalamanchiIdriss MekrezMatt Topper
    • John S. ThomasAravind YalamanchiIdriss MekrezMatt Topper
    • G06F17/30
    • G06F17/30867G06F17/30522G06F21/6227
    • A method and apparatus for proactive information security management is described. In one embodiment, for example, a computer-implemented method for controlling access to sensitive information, the method comprising: maintaining access constraint data that can be used to control access to the sensitive information, wherein the access constraint data includes match pattern data and apply pattern data; receiving a semantic query from a querier requesting access to the sensitive information; based on the match pattern data, determining whether the semantic query should be constrained according to the apply pattern data; where said semantic query should be constrained according to the apply pattern data, rewriting the semantic query according to the apply pattern data to produce a rewritten query; executing the rewritten query against a database that contains the sensitive information; and returning any results of executing the rewritten query.
    • 描述了用于主动信息安全管理的方法和装置。 在一个实施例中,例如,一种用于控制对敏感信息的访问的计算机实现的方法,所述方法包括:维护可用于控制对敏感信息的访问的访问约束数据,其中访问约束数据包括匹配模式数据并应用 模式数据; 从查询器接收请求访问敏感信息的语义查询; 基于匹配模式数据,确定是否应该根据应用模式数据约束语义查询; 其中所述语义查询应根据应用模式数据进行约束,根据应用模式数据重写语义查询以产生重写查询; 对包含敏感信息的数据库执行重写的查询; 并返回执行重写查询的任何结果。