会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 32. 发明申请
    • Cryptographically strong key derivation using password, audio-visual and mental means
    • 使用密码,视听和心理手段的密码型强密码派生
    • US20080263361A1
    • 2008-10-23
    • US11788687
    • 2007-04-20
    • Tanmoy DuttaSunil KadamTolga Acar
    • Tanmoy DuttaSunil KadamTolga Acar
    • H04L9/00
    • H04L9/0863H04L9/0891H04L2209/60H04L2209/80
    • A security system that uses a cryptographic key derived from human interaction with media. The system employs a set of parameters that includes user responses to graphical media and/or audio data, among other parameters. The architecture adds a fourth dimension to the conventional authentication means in order to make at least an offline attack on the key much more difficult. In addition to a standard set of parameters such as password, salt (random bits inserted into the encryption process) and iteration count, the system further utilizes information in the form of “what the user does” by presenting and prompting the user to interact with media in some way. The media can include audio information, video information, and/or image information, for example.
    • 一种安全系统,它使用与媒体进行人工交互导出的加密密钥。 系统采用一组参数,其中包括用户对图形媒体和/或音频数据的响应以及其他参数。 该体系结构为常规认证手段增加了第四个维度,以便至少使密钥的脱机攻击更加困难。 除了密码,盐(插入加密过程中的随机位)和迭代计数等一系列参数之外,系统还通过呈现和提示用户进行交互来进一步利用“用户所做的”形式的信息 媒体在某种程度上 媒体可以包括例如音频信息,视频信息和/或图像信息。
    • 34. 发明申请
    • SYSTEMS AND METHODS FOR FINE GRAINED ACCESS CONTROL OF DATA STORED IN RELATIONAL DATABASES
    • 用于关联数据库中存储的数据的细粒度访问控制的系统和方法
    • US20070174285A1
    • 2007-07-26
    • US11696024
    • 2007-04-03
    • Tanmoy DuttaConor CunninghamStefano StefaniGirish ChanderEric Hanson
    • Tanmoy DuttaConor CunninghamStefano StefaniGirish ChanderEric Hanson
    • G06F17/30
    • G06F21/6227Y10S707/99932Y10S707/99933Y10S707/99934Y10S707/99939
    • A system and method for facilitating secure access to database(s) is provided. The system relates to authorizing discriminatory access to relational database data. More particularly, the invention provides for an innovative technique of defining secured access to rows in relational database tables in a way that cannot be spoofed while preserving various optimization techniques. The invention affords a persistent scheme via providing for a security architecture whereby discriminatory access policies on persistent entities can be defined and enforced while preserving set based associative query capabilities. A particular aspect of the invention relates to the specification of such policies and the technique by which those policies are enforced. With respect to one particular implementation of the invention, creation, modification and deletion of access control lists called security descriptors is provided. The security descriptors can be provisioned independent of rows in tables of the database and can be shared and embody the policy on what permissions are granted to whom when associated with a row.
    • 提供了一种用于促进对数据库的安全访问的系统和方法。 该系统涉及授权对关系数据库数据的歧视性访问。 更具体地,本发明提供了一种创新技术,其以不能欺骗的方式定义对关系数据库表中的行的安全访问,同时保持各种优化技术。 本发明通过提供一种安全架构来提供持续方案,从而可以在保持基于集合的关联查询能力的同时定义和实施对持久性实体的区别性访问策略。 本发明的一个特定方面涉及这些策略的说明以及执行这些策略的技术。 关于本发明的一个具体实现,提供了称为安全描述符的访问控制列表的创建,修改和删除。 安全描述符可以独立于数据库表中的行进行配置,并且可以共享,并且包含与哪些权限相关联的权限被授予谁的策略。
    • 36. 发明申请
    • Systems and methods that optimize row level database security
    • 优化行级数据库安全性的系统和方法
    • US20050177570A1
    • 2005-08-11
    • US10885815
    • 2004-07-07
    • Tanmoy DuttaGirish ChanderLaurentiu CristoforRodger KlineJames Hamilton
    • Tanmoy DuttaGirish ChanderLaurentiu CristoforRodger KlineJames Hamilton
    • G06F17/30G06F17/40G06F21/62
    • G06F21/6227
    • The systems and methods of the present invention facilitate database row-level security by utilizing SQL extensions to create and associate named security expressions with a query initiator(s). Such expressions include Boolean expressions, which must be satisfied by a row of data in order for that data to be made accessible to the query initiator. In general, a query is augmented with security expressions, which are aggregated and utilized during querying rows of data. The systems and methods variously place security expressions within a query in order to optimize query performance while mitigating information leaks. This is achieved by tagging security expressions as special and utilizing rules of predicate to pull or push non-security expressions above or below security expressions, depending on the likelihood of a non-security being safe, as determined via a static and/or dynamic analysis.
    • 本发明的系统和方法通过利用SQL扩展来创建和关联命名的安全表达式与查询启动器来促进数据库行级安全性。 这样的表达式包括布尔表达式,这些表达式必须由一行数据满足,以使该数据能够被查询启动器访问。 一般来说,查询会增加安全性表达式,这些表达式在查询数据行期间进行聚合和使用。 系统和方法将查询中的安全表达式各不相同,以优化查询性能,同时减轻信息泄漏。 这是通过将安全表达式标记为特殊的,并利用谓词的规则在安全表达式之上或之下拉取或推送非安全性表达式,这取决于非安全性的可能性,通过静态和/或动态分析确定 。
    • 37. 发明授权
    • System and method for document isolation
    • 用于文档隔离的系统和方法
    • US08925035B2
    • 2014-12-30
    • US12731774
    • 2010-03-25
    • Tanmoy DuttaAlexander G. BalikovHimani Naresh
    • Tanmoy DuttaAlexander G. BalikovHimani Naresh
    • H04L9/32G06Q10/10
    • G06Q10/10Y10S707/99938
    • A computer based system and method of providing document isolation during routing of a document through a workflow is disclosed. The method comprises maintaining a separate “working” copy of the original base document while the document is routed through a workflow. Access controls, which define who may access the original document as well as any versions of the working copy document, are defined and stored in relation to the documents. The access controls further define the types of actions users may take with respect to the document. Users are selectively directed to the appropriate document, either the base document or working copy, and selectively granted permission to perform publishing operations on the working copy document, as determined by the access controls.
    • 公开了一种基于计算机的系统和在通过工作流程路由文档期间提供文档隔离的方法。 该方法包括在通过工作流路由文档时维护原始基本文档的单独“工作”副本。 定义谁可以访问原始文档以及任何版本的工作副本文档的访问控制是根据文档进行定义和存储的。 访问控制进一步定义用户可能对文档采取的操作类型。 用户被选择性地定向到适当的文档,即基本文档或工作副本,并且由访问控制确定,选择性地授予对工作副本文档执行发布操作的权限。
    • 40. 发明授权
    • Region-based security
    • 基于区域的安全
    • US08326877B2
    • 2012-12-04
    • US11122299
    • 2005-05-04
    • Ziquan LiTanmoy Dutta
    • Ziquan LiTanmoy Dutta
    • G06F7/00G06F17/30
    • G06F21/6227
    • The subject invention relates to systems and methods that provide region-based security to database objects having hierarchical relationships. In one aspect, a system is provided that facilitates database security and management. The system includes a database component that stores a plurality of objects having a hierarchical relationship between the objects. A region component defines security zones for a subset of the objects and maps security data to the subset, wherein the security zones are independent, decoupled, or disassociated from the hierarchical relationships between the objects.
    • 本发明涉及向具有分层关系的数据库对象提供基于区域的安全性的系统和方法。 在一个方面,提供了一种便于数据库安全和管理的系统。 该系统包括存储具有对象之间的分层关系的多个对象的数据库组件。 区域组件定义对象的子集的安全区域,并将安全数据映射到子集,其中,安全区域与对象之间的分层关系是独立的,去耦合的或与之关联的。