会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • TYPE SYSTEM FOR ACCESS CONTROL LISTS
    • 用于访问控制列表的类型系统
    • US20100281060A1
    • 2010-11-04
    • US12433735
    • 2009-04-30
    • Tanvir AhmedThomas KeefeeVikram PesatiEric Sedlar
    • Tanvir AhmedThomas KeefeeVikram PesatiEric Sedlar
    • G06F17/30
    • G06F21/6227G06F21/604G06F21/6218G06F2221/2141
    • A method and storage media for performing access resolution using ACL types is provided. Under an AND semantic, an intersection set formed from the types of multiple ACLs protecting a resource may be utilized to efficiently determine whether a request for a privilege to access the resource is granted or denied. If the privilege is not a member of the intersection set, the privilege cannot be granted. A union set may be used for an OR semantic. A global ACL type may represent all privileges system-wide or application-wide. A global ACL may represent a system-wide or application-wide access policy. A conjunction of a global ACL and a regular ACL may be stored in a cache. The union set, intersection set, or access resolution may also be cached for subsequent request processing.
    • 提供了一种使用ACL类型执行访问分辨率的方法和存储介质。 在AND语义下,可以利用从保护资源的多个ACL的类型形成的交集,以有效地确定是否授予或拒绝访问资源的特权请求。 如果权限不是交集集的成员,则不能授予权限。 联合集合可以用于OR语义。 全局ACL类型可以表示系统范围或应用程序范围内的所有权限。 全局ACL可以表示全系统或应用程序范围的访问策略。 全局ACL和常规ACL的连接可以存储在缓存中。 联合集,交集或访问分辨率也可被缓存以用于后续请求处理。
    • 4. 发明授权
    • Access control model of function privileges for enterprise-wide applications
    • 企业级应用程序功能特权的访问控制模型
    • US08732847B2
    • 2014-05-20
    • US12551217
    • 2009-08-31
    • Thomas KeefeTanvir AhmedVikram PesatiRoger Wigenstam
    • Thomas KeefeTanvir AhmedVikram PesatiRoger Wigenstam
    • G06F7/04G06F7/00
    • G06F21/6218G06F2221/2141
    • Techniques are provided for access control in a system. A request is received for checking whether a subject has a privilege for a resource. A security class that defines a plurality of privileges that include the requested privilege is determined. One or more access control lists have been configured for the security class. The one or more access control lists comprise one or more access control entries. Each of the one more access control entry defines whether one or more subjects has been granted or denied to zero, one or more of the plurality of privileges defined in the security class. Based on the access control lists configured for the security class, it is determined whether the subject should be granted the privilege for the requested resource.
    • 为系统中的访问控制提供了技术。 接收到用于检查被摄体是否具有资源特权的请求。 确定定义包括所请求特权的多个特权的安全类。 为安全类配置了一个或多个访问控制列表。 一个或多个访问控制列表包括一个或多个访问控制条目。 一个更多的访问控制条目中的每一个定义一个或多个主体是否被授予或拒绝为零,在安全级别中定义的多个权限中的一个或多个。 基于为安全类配置的访问控制列表,确定是否应该为被请求资源授予主体权限。
    • 5. 发明授权
    • Type system for access control lists
    • 输入访问控制列表的系统
    • US08095557B2
    • 2012-01-10
    • US12433735
    • 2009-04-30
    • Tanvir AhmedThomas KeefeeVikram PesatiEric Sedlar
    • Tanvir AhmedThomas KeefeeVikram PesatiEric Sedlar
    • G06F17/30
    • G06F21/6227G06F21/604G06F21/6218G06F2221/2141
    • A method and storage media for performing access resolution using ACL types is provided. Under an AND semantic, an intersection set formed from the types of multiple ACLs protecting a resource may be utilized to efficiently determine whether a request for a privilege to access the resource is granted or denied. If the privilege is not a member of the intersection set, the privilege cannot be granted. A union set may be used for an OR semantic. A global ACL type may represent all privileges system-wide or application-wide. A global ACL may represent a system-wide or application-wide access policy. A conjunction of a global ACL and a regular ACL may be stored in a cache. The union set, intersection set, or access resolution may also be cached for subsequent request processing.
    • 提供了一种使用ACL类型执行访问分辨率的方法和存储介质。 在AND语义下,可以利用从保护资源的多个ACL的类型形成的交集,以有效地确定是否授予或拒绝访问资源的特权请求。 如果权限不是交集集的成员,则不能授予权限。 联合集合可以用于OR语义。 全局ACL类型可以表示系统范围或应用程序范围内的所有权限。 全局ACL可以表示全系统或应用程序范围的访问策略。 全局ACL和常规ACL的连接可以存储在缓存中。 联合集,交集或访问分辨率也可被缓存以用于后续请求处理。
    • 7. 发明授权
    • SQL transformation-based optimization techniques for enforcement of data access control
    • 用于执行数据访问控制的基于SQL变换的优化技术
    • US09043309B2
    • 2015-05-26
    • US13488739
    • 2012-06-05
    • Tanvir AhmedThomas KeefeChao LiangVikram Pesati
    • Tanvir AhmedThomas KeefeChao LiangVikram Pesati
    • G06F17/30G06F21/62
    • G06F21/30G06F17/30448G06F21/6218G06F21/6227G06F2221/2141
    • Techniques are provided for a database server to identify a query that comprises an access check operator specifying a data access control policy, and if so, to re-write the query to produce an optimized query execution plan. A first technique rewrites a query comprising an access check operator based on the privileges associated with the database principal requesting the query. The rewritten query exposes the access predicates relevant to the requesting principal to subsequent database optimization processes. A second technique rewrites a query comprising an access check operator that specifies a data security policy that does not include a denied privilege. A third technique rewrites a query that comprises an access check operator specifying one or more database table columns that store row-specific access control lists. The rewritten queries are used to generate a query execution plan that provides for several query execution optimizations.
    • 为数据库服务器提供技术以识别包括指定数据访问控制策略的访问检查运算符的查询,如果是,则重写该查询以产生优化的查询执行计划。 第一种技术基于与请求查询的数据库主体相关联的特权来重写包括访问检查运算符的查询。 重写的查询将与请求主体相关的访问谓词公开给后续的数据库优化过程。 第二种技术重写包括访问检查运算符的查询,其指定不包括被拒绝的特权的数据安全策略。 第三种技术重写包含访问检查运算符的查询,该查询运算符指定存储行特定访问控制列表的一个或多个数据库表列。 重写的查询用于生成提供多个查询执行优化的查询执行计划。
    • 9. 发明申请
    • SQL TRANSFORMATION-BASED OPTIMIZATION TECHNIQUES FOR ENFORCEMENT OF DATA ACCESS CONTROL
    • 用于执行数据访问控制的基于SQL变换的优化技术
    • US20130325841A1
    • 2013-12-05
    • US13488739
    • 2012-06-05
    • Tanvir AhmedThomas KeefeChao LiangVikram Pesati
    • Tanvir AhmedThomas KeefeChao LiangVikram Pesati
    • G06F17/30
    • G06F21/30G06F17/30448G06F21/6218G06F21/6227G06F2221/2141
    • Techniques are provided for a database server to identify a query that comprises an access check operator specifying a data access control policy, and if so, to re-write the query to produce an optimized query execution plan. A first technique rewrites a query comprising an access check operator based on the privileges associated with the database principal requesting the query. The rewritten query exposes the access predicates relevant to the requesting principal to subsequent database optimization processes. A second technique rewrites a query comprising an access check operator that specifies a data security policy that does not include a denied privilege. A third technique rewrites a query that comprises an access check operator specifying one or more database table columns that store row-specific access control lists. The rewritten queries are used to generate a query execution plan that provides for several query execution optimizations.
    • 为数据库服务器提供技术以识别包括指定数据访问控制策略的访问检查运算符的查询,如果是,则重写该查询以产生优化的查询执行计划。 第一种技术基于与请求查询的数据库主体相关联的特权来重写包括访问检查运算符的查询。 重写的查询将与请求主体相关的访问谓词公开给后续的数据库优化过程。 第二种技术重写包括访问检查运算符的查询,其指定不包括被拒绝的特权的数据安全策略。 第三种技术重写包含访问检查运算符的查询,该查询运算符指定存储行特定访问控制列表的一个或多个数据库表列。 重写的查询用于生成提供多个查询执行优化的查询执行计划。