会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • CREDENTIAL-BASED ACCESS TO DATA
    • 基于资料的数据访问
    • US20110231940A1
    • 2011-09-22
    • US12727763
    • 2010-03-19
    • Raja Pazhanivel PerumalJeffrey B. Hamblin
    • Raja Pazhanivel PerumalJeffrey B. Hamblin
    • G06F21/24G06F17/30
    • G06F21/335G06F2221/2103G06F2221/2143G06F2221/2145H04L63/101
    • Existing mechanisms that control access to data based upon whether the user seeking to access the data is identified among the users that are allowed to access the data, can be extended to further control access based upon the provision of credential data by the user, or processes associated therewith. Access control entries can limit access based upon Boolean conditionals, including those referencing credential data, such that access can be granted only to specific users that provide the credential data or, alternatively, to any user that provides it. The referenced credential data can be specified in the access control information in an obfuscated form for security purposes. Information associated with the user, such as a user token, can be temporarily updated to include credential data when provided by the user, so as to enable access to the data but to prevent such access from remaining open too long.
    • 可以根据用户访问数据的用户是否识别访问数据的现有机制,可以扩展为进一步控制访问,这是基于用户提供的凭据数据或处理 相关联。 访问控制条目可以基于布尔条件(包括引用凭证数据的那些)来限制访问,使得仅可以向提供证书数据的特定用户授予访问权,或者替代地,授予提供证书数据的任何用户的访问。 为了安全起见,引用的凭证数据可以以混淆形式在访问控制信息中指定。 与用户相关联的信息(例如用户令牌)可以被临时更新,以在由用户提供时包括凭证数据,以便能够访问数据,但是防止这种访问保持打开太久。
    • 10. 发明授权
    • Hashing using multiple sub-hashes
    • 散列使​​用多个子哈希值
    • US07248691B1
    • 2007-07-24
    • US09704186
    • 2000-10-31
    • Bhalchandra S. PanditRobert P. ReichelJeffrey B. HamblinKedarnath A. Dubhashi
    • Bhalchandra S. PanditRobert P. ReichelJeffrey B. HamblinKedarnath A. Dubhashi
    • H04K1/00H04L9/00
    • H04L9/3236H04L9/0643H04L9/3234H04L2209/38
    • A hashing structure including multiple sub-hashes is used to determine whether an input value matches one or more of multiple target values. These values can be of any form, such as security identifiers in an access control system. To make the determination, a hash key is obtained from the input value and multiple sub-hash indexes (one for each of the multiple sub-hashes) are generated based on the key. Values are identified from the multiple sub-hashes by indexing into the sub-hashes using respective ones of the sub-hash indexes. These values are then combined to generate a resultant hash value. Each of the multiple target values corresponds to one of multiple portions of the resultant hash value. If the portion corresponding to one of the target values has a particular value, then that target value is a likely match and is compared to the input value to determine if indeed the two match. This comparison can then be repeated for each target value with a corresponding portion in the resultant hash value that has the particular value.
    • 使用包括多个子哈希的哈希结构来确定输入值是否匹配多个目标值中的一个或多个。 这些值可以是任何形式,例如访问控制系统中的安全标识符。 为了确定,从输入值获得散列密钥,并且基于密钥生成多个子散列索引(对于多个子哈希中的每一个分别为一个)。 通过使用相应的子哈希索引索引到子哈希中,从多个子哈希识别值。 然后将这些值组合以生成合成的散列值。 多个目标值中的每一个对应于所得到的散列值的多个部分之一。 如果对应于目标值之一的部分具有特定值,则该目标值是可能的匹配,并且与输入值进行比较以确定两者是否匹配。 然后可以对具有特定值的合成哈希值中的相应部分对每个目标值重复该比较。