会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 91. 发明授权
    • Systems and methods for detecting exposure of private keys
    • 用于检测私钥暴露的系统和方法
    • US08285985B2
    • 2012-10-09
    • US12314671
    • 2008-12-15
    • Udo Klein
    • Udo Klein
    • H04L29/06
    • H04L9/0891H04L9/3268
    • A system and method can include comparing entities associated with public certificates and private keys in a keystore to detect compromised private keys. This increases security of systems implementing public key cryptography over a network. The comparison can be triggered by a trigger event in one embodiment. If a private key belonging to a certificate authority is detected, a notification can be generated. Alternatively or in addition, a revocation request can be generated for public certificates corresponding to the compromised private key.
    • 系统和方法可以包括比较与密钥库中的公共证书和私钥相关联的实体以检测受损的私钥。 这增加了通过网络实施公共密钥加密的系统的安全性。 在一个实施例中,触发事件可以触发该比较。 如果检测到属于证书颁发机构的私钥,则可以产生通知。 或者或另外,可以为对应于受损密钥的公共证书生成吊销请求。
    • 93. 发明授权
    • Systems and methods for performing authorization
    • 用于执行授权的系统和方法
    • US08156124B2
    • 2012-04-10
    • US12656409
    • 2010-01-28
    • Udo Klein
    • Udo Klein
    • G06F7/00G06F17/30
    • G06F21/604Y10S707/99939
    • Systems, methods, and computer program products are provided for performing an authorization check for a user. In one implementation, a data processing system is provided that includes means for storing first data descriptive of at least one directed acyclic graph and for storing second data descriptive of an assignment of a user to a first node of the graph. The data processing system also includes means for receiving an access request of the user, the access request specifying a second node of the graph. Furthermore, the data processing system includes means for determining a least common ancestor of the first and second nodes of the graph and means for performing an authorization check adapted to grant authorization for the access request if the least common ancestor of the first and second nodes is the first node.
    • 提供了系统,方法和计算机程序产品,用于对用户执行授权检查。 在一个实现中,提供了一种数据处理系统,其包括用于存储描述至少一个有向非循环图的第一数据的装置,以及用于将描述用户的分配的第二数据存储到该图的第一个节点。 数据处理系统还包括用于接收用户的访问请求的装置,指定图形的第二节点的访问请求。 此外,数据处理系统包括用于确定图的第一和第二节点的最小共同祖先的装置,以及如果第一和第二节点的最小共同祖先是 第一个节点。
    • 94. 发明授权
    • Uniquely identifying an object before it is stored in a database
    • 在将对象存储在数据库中之前,将其唯一标识
    • US07856457B1
    • 2010-12-21
    • US11957166
    • 2007-12-14
    • Udo KleinChristian BehrensSteffen Rotsch
    • Udo KleinChristian BehrensSteffen Rotsch
    • G06F17/30
    • G06F17/30557Y10S707/99933Y10S707/99938Y10S707/99942Y10S707/99945
    • Systems and techniques to identify records corresponding to a database system before they are stored in the database. In general, in one implementation, the technique includes: generating a mapping that may be usable to identify a record in a database by reference to a database key. The database key may have a corresponding record in the database and the database key can be a unique value based on information independent of both the content and organization of a record. The technique can include generating a second mapping usable to identify records in the database by reference to a second type of database key. The second type of database key may correspond to a record in the database and the second type of database key can be a unique value.
    • 在将数据库系统存储在数据库中之前,识别对应于数据库系统的记录的系统和技术。 通常,在一个实现中,该技术包括:生成可以用于通过参考数据库密钥来识别数据库中的记录的映射。 数据库密钥可以在数据库中具有对应的记录,并且数据库密钥可以是基于独立于记录的内容和组织的信息的唯一值。 该技术可以包括通过参考第二类型的数据库密钥来产生可用于识别数据库中的记录的第二映射。 数据库密钥的第二种类型可以对应于数据库中的记录,并且第二类型的数据库密钥可以是唯一值。
    • 96. 发明授权
    • Methods and systems for propagating locks through nested logical units of work
    • 通过嵌套逻辑工作单元传播锁的方法和系统
    • US07756846B2
    • 2010-07-13
    • US11171182
    • 2005-07-01
    • Udo KleinRené Dehn
    • Udo KleinRené Dehn
    • G06F7/00G06F17/00
    • G06F17/30362Y10S707/99938
    • Systems and methods are disclosed for managing a lock on an object dependent upon a nested LUW. The disclosed systems and methods may include registering a lock manager with an LUW manager responsible for managing a nested LUW on a buffer. The nested LUW may comprise an inner LUW and an outer LUW. The systems and method may further include locking an object affected by the inner LUW of the nested LUW. The LUW manager may transmit to the lock manager any events pertaining to the inner LUW. The lock manager may be operative to determine, based on the events pertaining to the LUW received from the LUW manager, whether the lock should be retained or released such that the status of the lock is consistent with the state of the nested LUW.
    • 公开了用于管理取决于嵌套LUW的对象上的锁的系统和方法。 所公开的系统和方法可以包括向负责管理缓冲器上的嵌套LUW的LUW管理员注册锁管理器。 嵌套LUW可以包括内部LUW和外部LUW。 系统和方法还可以包括锁定受嵌套LUW的内部LUW影响的对象。 LUW管理员可以向锁管理员发送与内部LUW有关的任何事件。 锁定管理器可以操作以基于与从LUW管理器接收的LUW有关的事件来确定是否应该保留或解除锁定,使得锁的状态与嵌套的LUW的状态一致。
    • 97. 发明授权
    • Providing a file relating to a telephone call
    • 提供与电话有关的文件
    • US07693272B2
    • 2010-04-06
    • US10732598
    • 2003-12-10
    • Udo Klein
    • Udo Klein
    • H04M3/42H04M5/00H04M3/00
    • H04M3/5183H04M3/42068
    • When a person receives an incoming telephone call, one or more files that the person is most likely to need are provided. The files are identified by analyzing information about what the person did in previous phone conversations with the same caller. That is, when the person opens files in the computer system during a phone call, this is recorded in a register that can be analyzed to identify the most likely needed files. Calls from more than one specific telephone number may be covered by the technique and several answering persons' actions may be tracked.
    • 当一个人收到来电时,提供该人最有可能需要的一个或多个文件。 通过分析有关该用户在以前与同一个呼叫者的电话对话中所做的操作的信息来识别这些文件。 也就是说,当用户在电话呼叫期间打开计算机系统中的文件时,这被记录在可以被分析以识别最可能需要的文件的寄存器中。 来自多个特定电话号码的呼叫可以被该技术覆盖,并且可以跟踪几个应答者的动作。
    • 99. 发明授权
    • Mapping pseudo-random numbers to predefined number ranges
    • 将伪随机数映射到预定义的数字范围
    • US07328228B2
    • 2008-02-05
    • US10653789
    • 2003-09-02
    • Udo KleinPeter Januschke
    • Udo KleinPeter Januschke
    • G06F1/02
    • G06F7/582
    • Pseudo-random numbers (PRNs) generated by a PRN generator are mapped to predefined number ranges or target ranges. The target range may be smaller or larger than the range of the PRN generator. Mapping to a smaller target range may include generating PRNs (e.g., integers) from a particular bit-input stream (e.g., 32-bit) having a uniform distribution across the range of numbers; selecting an optimal subset of the generated PRNs to map; and mapping the selected PRNs to a corresponding number in a target range such that the mapped numbers are uniformly distributed across the target range. Mapping to a larger target range may include generating uniformly distributed PRNs; applying a generation function to the PRNs to generate uniformly distributed packed numbers; and applying a mapping function to map selected packed numbers to the target range such that the mapped numbers are uniformly distributed.
    • 由PRN生成器生成的伪随机数(PRN)映射到预定义的数字范围或目标范围。 目标范围可以小于或大于PRN发生器的范围。 映射到更小的目标范围可以包括从数字范围内具有均匀分布的特定位输入流(例如,32位)生成PRN(例如,整数); 选择生成的PRN的最佳子集进行映射; 以及将所选择的PRN映射到目标范围中的对应数字,使得映射的数字在目标范围内均匀分布。 映射到更大的目标范围可以包括生成均匀分布的PRN; 对PRN应用生成函数以生成均匀分布的包数; 以及应用映射函数将所选择的打包数映射到目标范围,使得映射的数字均匀分布。