会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for adaptive vulnerability scanning of an application
    • 应用程序的自适应漏洞扫描的方法和系统
    • US08839441B2
    • 2014-09-16
    • US12858884
    • 2010-08-18
    • Ashutosh SaxenaManeesh PonnathVishal Anjaiah Gujjary
    • Ashutosh SaxenaManeesh PonnathVishal Anjaiah Gujjary
    • G06F11/00G06F21/57
    • G06F21/577
    • A method and system for adaptive vulnerability scanning (AVS) of an application is provided. The adaptive vulnerability scanning of an application assists in identifying new vulnerabilities dynamically. The endpoints of an application are scanned using a predefined set of rules. Subsequently, one or more possible vulnerabilities are presented. The vulnerabilities are analyzed and predefined rules are modified. The steps of scanning the application and modification of rules are iteratively repeated till the adaptive vulnerability scanning capability is achieved. A neural network is used for training the adaptive vulnerability scanner. This neural network is made to learn some rules based on predefined set of rules while undergoing the training phase. At least one weight in neural networks is altered while imparting the self learning capability.
    • 提供了一种应用的自适应漏洞扫描(AVS)的方法和系统。 应用程序的自适应漏洞扫描有助于动态识别新的漏洞。 使用预定义的一组规则扫描应用程序的端点。 随后,提出了一个或多个可能的漏洞。 分析漏洞并修改预定义规则。 迭代重复扫描应用程序和修改规则的步骤,直到实现自适应漏洞扫描功能。 神经网络用于训练自适应漏洞扫描器。 这个神经网络是在进行训练阶段的基础上,基于预定义的规则集来学习一些规则。 改变神经网络中的至少一个权重,同时赋予自学习能力。
    • 3. 发明申请
    • SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE
    • 基于语音数字签名服务的系统与方法
    • US20130006642A1
    • 2013-01-03
    • US13246767
    • 2011-09-27
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • Ashutosh SaxenaVishal Anjaiah GujjaryHarigopal K.B. Ponnapalli
    • G10L17/00
    • G10L17/00
    • Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user.
    • 公开了用于提供基于语音的数字签名服务的方法和系统。 该方法包括将文档发送给第二用户进行签名的第一用户,并且第一用户还向第二用户和语音验证机构发送PIN。 第二用户向语音验证机构发送包括PIN的语音记录以及第二用户同意PIN。 所述语音验证机构将所述语音记录与所述第二用户的预定义语音样本进行比较,以及从所述第一用户接收到的所述PIN与从所述第二用户接收的所述PIN。 语音验证机构随后根据比较向签署实体发送通知。 签名实体用与第二用户相关联的私钥对文档的PIN进行签名,并向第一用户和第二用户发送确认。
    • 4. 发明授权
    • System and method for adaptive data masking
    • 用于自适应数据屏蔽的系统和方法
    • US08306932B2
    • 2012-11-06
    • US12384776
    • 2009-04-08
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • G06F15/18G06N3/00
    • G06N3/0427G06N3/08
    • A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    • 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。
    • 7. 发明申请
    • METHOD FOR MONEY TRANSFER USING A MOBILE DEVICE
    • 使用移动设备进行货币转移的方法
    • US20110099107A1
    • 2011-04-28
    • US12814568
    • 2010-06-14
    • Ashutosh SaxenaMeena Dilip Singh
    • Ashutosh SaxenaMeena Dilip Singh
    • G06Q40/00
    • G06Q20/223G06Q20/108G06Q20/32G06Q20/3223
    • A method and system to mobile based money transaction across different transaction entity. A non-repudiable message, using a first mobile device, is sent to a first transaction entity expressing to provide a token wherein the mobile device is registered with the first transaction entity. The first transaction entity provides a generated token to the first mobile device using non-repudiable messaging services. The first mobile, in turn, transfers the non-repudiable message to a second mobile device of a second user including a token and a transaction entity code. The second mobile device sends the non-repudiable message to a second transaction entity, indicating a token number, a transaction entity code, and sum of money being transferred. The second transaction entity advances the token number, via a non-repudiable message, to a transaction entity indicated by the transaction code to authenticate the token. The first transaction entity authenticates token on receiving from second transaction entity and money being transferred for genuine token as indicated by first transaction machine. Alternatively, the second transaction entity transfers the equivalent sum of money to the first transaction entity indicating money should be transferred to the linked account of the token.
    • 跨越不同交易实体的基于移动的货币交易的方法和系统。 使用第一移动设备的不可否认消息被发送到表示提供令牌的第一交易实体,其中移动设备向第一交易实体注册。 第一个事务实体使用不可否认的消息服务向第一移动设备提供生成的令牌。 第一移动装置又将不可斥责的消息传送到包括令牌和交易实体代码的第二用户的第二移动设备。 第二移动设备将不可斥责的消息发送到第二交易实体,指示令牌号码,交易实体代码和正在传送的金额的总和。 第二交易实体通过不可斥责的消息将令牌号码递交到由交易代码指示的交易实体来认证令牌。 第一交易实体在从第二交易实体接收到的令牌和第一交易机所指示的兑换正币的货币时进行认证。 或者,第二交易实体将等值的金额转移给第一交易实体,指示货币应该被转移到令牌的链接帐户。
    • 9. 发明申请
    • METHOD FOR PASSWORD BASED AUTHENTICATION TRUST GENERATION AND AUTHORIZATION THEREOF
    • 基于密码的认证信任产生及授权方法
    • US20100064365A1
    • 2010-03-11
    • US12539703
    • 2009-08-12
    • Tiruvengalam KanduriAshutosh Saxena
    • Tiruvengalam KanduriAshutosh Saxena
    • G06F21/00
    • G06F21/31
    • A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score for the second password on summing the generating value, combining trust levels of multiple users to attain a higher trust level in aggregate, and obtaining access in a service if the aggregated trust level of users are equal to or more than the predetermined trust level of the service. The present technique provides flexibility of authenticating and authorizing a user to access in a service to perform desirable functions thereon. The present technique eliminates the requirement of tokens, pins, dongles etc while attaining a higher trust level to perform a task which belongs to a higher trust level.
    • 提供了一种方法和系统来授权用户访问较高信任级别的服务。 该方法包括以下步骤:定义第一密码,为用户分配第二密码,在操作排他性关系时生成第二密码的每个组成成分的值,在求和生成值时计算第二密码的分数,组合信任级别 多个用户聚合获得更高的信任级别,如果用户的聚合信任级别等于或大于服务的预定信任级别,则获得服务中的访问。 本技术提供了认证和授权用户访问服务以在其上执行所需功能的灵活性。 本技术消除了对令牌,引脚,加密狗等的要求,同时获得更高的信任级别来执行属于更高信任级别的任务。
    • 10. 发明申请
    • System and method for adaptive data masking
    • 用于自适应数据屏蔽的系统和方法
    • US20090281974A1
    • 2009-11-12
    • US12384776
    • 2009-04-08
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • Ashutosh SaxenaVishal Anjaiah GujjaryKumar Surni
    • G06N3/08G06F15/18G06F17/30
    • G06N3/0427G06N3/08
    • A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    • 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。