会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 22. 发明授权
    • Systems and methods for securing data in motion
    • 确保数据运动的系统和方法
    • US08650434B2
    • 2014-02-11
    • US13077802
    • 2011-03-31
    • Rick L. OrsiniMark S. O'Hare
    • Rick L. OrsiniMark S. O'Hare
    • G06F11/00
    • G06F21/6218G06F11/1076G06F11/182G06F11/2094G06F21/60G06F21/602G06F21/6227G06F21/72G06F2221/2101G06F2221/2107H04L9/085H04L9/0894H04L63/0428H04L63/08H04L63/0861H04L67/1097
    • Systems and methods for reading and writing a set of data using a journaling service are provided. The journaling service may be used to identify and record data storage operations associated with one or more shares of data stored in one or more share locations. The journaling service may use logs to record each of the read and write requests to the share locations. In some embodiments, the log may be a queue data structure that stores information associated with failed data storage operations. In some embodiments, the journaling service may leverage both memory and disk storage in order to maintain the journaling queue. In some embodiments, the journaling queue may maintain information associated with the state of each share location. In some embodiments, this information may be used by the journaling service to determine when to monitor and record information regarding data storage operations associated with the share locations.
    • 提供了使用日志服务读取和写入一组数据的系统和方法。 日志记录服务可用于识别和记录与存储在一个或多个共享位置中的一个或多个共享数据相关联的数据存储操作。 日志记录服务可以使用日志将每个读取和写入请求记录到共享位置。 在一些实施例中,日志可以是存储与故障数据存储操作相关联的信息的队列数据结构。 在一些实施例中,日志记录服务可以利用存储器和磁盘存储器来维护日志记录队列。 在一些实施例中,日志队列可以维护与每个共享位置的状态相关联的信息。 在一些实施例中,日志记录服务可以使用该信息来确定何时监视和记录关于与共享位置相关联的数据存储操作的信息。
    • 30. 发明申请
    • SYSTEMS AND METHODS FOR SECURING DATA IN MOTION
    • 用于保护运动数据的系统和方法
    • US20110246766A1
    • 2011-10-06
    • US13077770
    • 2011-03-31
    • Rick L. OrsiniMark S. O'Hare
    • Rick L. OrsiniMark S. O'Hare
    • H04L29/06
    • G06F21/6218G06F11/1076G06F11/182G06F11/2094G06F21/60G06F21/602G06F21/6227G06F21/72G06F2221/2101G06F2221/2107H04L9/085H04L9/0894H04L63/0428H04L63/08H04L63/0861H04L67/1097
    • The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
    • 本发明的系统和方法提供了一种解决方案,使得数据可靠地安全和可访问 - 在位级别处理数据安全性,从而消除对多周边硬件和软件技术的需要。 将数据安全性直接并入或编织在位级别的数据中。 本发明的系统和方法使企业社区能够利用共同的企业基础架构。 由于安全性已经被编入数据,因此可以使用这种通用的基础架构,而不会影响数据安全性和访问控制。 在某些应用中,数据在被发送到多个位置(例如私有云或公共云)之前被认证,加密和解析或分割成多个共享。 数据在传输到存储位置时被隐藏,并且对于没有正确凭据进行访问的用户无法访问。