会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Multi-control password changing
    • 多控制密码更改
    • US09049189B2
    • 2015-06-02
    • US13728803
    • 2012-12-27
    • Anil GoelRamesh GuptaAsif Iqbal DesaiVivek KandiyanallurSomnath Ghosh
    • Anil GoelRamesh GuptaAsif Iqbal DesaiVivek KandiyanallurSomnath Ghosh
    • G06F17/30H04L29/06G06F21/45
    • H04L63/083G06F21/45H04L63/20
    • Multi-control password changing includes initiating a password change cycle to change a target user's password, selecting a plurality of administrators to provide password part inputs, receiving password part inputs separately and confidentially from the plurality of administrators, generating a multi-control password comprised of multiple password part inputs, changing the target user's password to the multi-control password, and transmitting either the single multi-control password or multiple password parts each separately to target user. In an exemplary embodiment, a system for multi-control password changing includes a multi-control password changing module configured to change a target user's password, a recruitment module configured to select a plurality of administrators to provide password part inputs, a regulation module configured to receive and process password part inputs from the plurality of administrators, and a change value module configured to generate a multi-control password comprised of multiple password part inputs.
    • 多控制密码改变包括启动密码更改周期以改变目标用户的密码,选择多个管理员以提供密码部分输入,从多个管理员分别和保密地接收密码部分输入,生成由多个管理员组成的多控制密码 多个密码部分输入,将目标用户的密码更改为多重密码,并将单个多重密码或多个密码分别单独发送给目标用户。 在示例性实施例中,用于多控制密码改变的系统包括被配置为改变目标用户密码的多控制密码改变模块,被配置为选择多个管理员以提供密码部分输入的招聘模块,配置为 接收和处理来自多个管理员的密码部分输入;以及变更值模块,被配置为生成由多个密码部分输入组成的多重控制密码。
    • 2. 发明申请
    • Multi-Control Password Changing
    • 多控制密码更改
    • US20140109206A1
    • 2014-04-17
    • US13728803
    • 2012-12-27
    • Anil GoelRamesh GuptaAsif Iqbal DesaiVivek KandiyanallurSomnath Ghosh
    • Anil GoelRamesh GuptaAsif Iqbal DesaiVivek KandiyanallurSomnath Ghosh
    • H04L29/06
    • H04L63/083G06F21/45H04L63/20
    • Multi-control password changing includes initiating a password change cycle to change a target user's password, selecting a plurality of administrators to provide password part inputs, receiving password part inputs separately and confidentially from the plurality of administrators, generating a multi-control password comprised of multiple password part inputs, changing the target user's password to the multi-control password, and transmitting either the single multi-control password or multiple password parts each separately to target user. In an exemplary embodiment, a system for multi-control password changing includes a multi-control password changing module configured to change a target user's password, a recruitment module configured to select a plurality of administrators to provide password part inputs, a regulation module configured to receive and process password part inputs from the plurality of administrators, and a change value module configured to generate a multi-control password comprised of multiple password part inputs.
    • 多控制密码改变包括启动密码更改周期以改变目标用户的密码,选择多个管理员以提供密码部分输入,从多个管理员分别和保密地接收密码部分输入,生成由多个管理员组成的多控制密码 多个密码部分输入,将目标用户的密码更改为多重密码,并将单个多重密码或多个密码分别单独发送给目标用户。 在示例性实施例中,用于多控制密码改变的系统包括被配置为改变目标用户密码的多控制密码改变模块,被配置为选择多个管理员以提供密码部分输入的招聘模块,配置为 接收和处理来自多个管理员的密码部分输入;以及变更值模块,被配置为生成由多个密码部分输入组成的多重控制密码。
    • 3. 发明申请
    • AUTONOMOUS ROLE-BASED SECURITY FOR DATABASE MANAGEMENT SYSTEMS
    • 用于数据库管理系统的自动基于角色的安全
    • US20150026215A1
    • 2015-01-22
    • US13945148
    • 2013-07-18
    • Anil GoelAsif Iqbal DesaiRamesh GuptaSomnath GhoshHarin Vadodaria
    • Anil GoelAsif Iqbal DesaiRamesh GuptaSomnath GhoshHarin Vadodaria
    • G06F21/62
    • G06F21/604G06F21/6218
    • Embodiments described herein generally relate to creating an autonomous role-based security system for a database management system, wherein a super user may not always be required. A computer-implemented method is described. The method includes establishing one or more privileges in a database system, each privilege controlling access to an administrative function for the database system. Each privilege is assigned to one or more roles. Each role may always have a minimum set of users with only administrative rights over the role. A request is received from a first user to grant a role to a second user. A database management system determines whether the first user has administrative privileges over the role. If the first user has administrative privileges over the role, the role is granted to the second user. The database system may satisfy the principles of least privilege and separation of duties.
    • 本文描述的实施例通常涉及为数据库管理系统创建自主的基于角色的安全系统,其中可能不总是需要超级用户。 描述了计算机实现的方法。 该方法包括在数据库系统中建立一个或多个特权,每个权限控制对数据库系统的管理功能的访问。 每个权限都分配给一个或多个角色。 每个角色可能总是拥有一个最小的用户组,只对该角色具有管理权限。 从第一用户接收到向第二用户授予角色的请求。 数据库管理系统确定第一个用户是否具有该角色的管理权限。 如果第一个用户对该角色具有管理权限,该角色将被授予第二个用户。 数据库系统可以满足最低权限和职责分离的原则。
    • 4. 发明授权
    • Autonomous role-based security for database management systems
    • 数据库管理系统的基于角色的自主安全
    • US09298933B2
    • 2016-03-29
    • US13945148
    • 2013-07-18
    • Anil GoelAsif Iqbal DesaiRamesh GuptaSomnath GhoshHarin Vadodaria
    • Anil GoelAsif Iqbal DesaiRamesh GuptaSomnath GhoshHarin Vadodaria
    • G06F17/30G06F21/60G06F21/62
    • G06F21/604G06F21/6218
    • Embodiments described herein generally relate to creating an autonomous role-based security system for a database management system, wherein a super user may not always be required. A computer-implemented method is described. The method includes establishing one or more privileges in a database system, each privilege controlling access to an administrative function for the database system. Each privilege is assigned to one or more roles. Each role may always have a minimum set of users with only administrative rights over the role. A request is received from a first user to grant a role to a second user. A database management system determines whether the first user has administrative privileges over the role. If the first user has administrative privileges over the role, the role is granted to the second user. The database system may satisfy the principles of least privilege and separation of duties.
    • 本文描述的实施例通常涉及为数据库管理系统创建自主的基于角色的安全系统,其中可能不总是需要超级用户。 描述了计算机实现的方法。 该方法包括在数据库系统中建立一个或多个特权,每个权限控制对数据库系统的管理功能的访问。 每个权限都分配给一个或多个角色。 每个角色可能总是拥有一个最小的用户组,只对该角色具有管理权限。 从第一用户接收到向第二用户授予角色的请求。 数据库管理系统确定第一个用户是否具有该角色的管理权限。 如果第一个用户对该角色具有管理权限,该角色将被授予第二个用户。 数据库系统可以满足最低权限和职责分离的原则。
    • 7. 发明申请
    • DELTA STORE GIVING ROW-LEVEL VERSIONING SEMANTICS TO A NON-ROW-LEVEL VERSIONING UNDERLYING STORE
    • DELTA STORE提供低价位版本的语言到基于商店的非线性版本
    • US20150046413A1
    • 2015-02-12
    • US13960335
    • 2013-08-06
    • Mihnea ANDREIColin FlorendoAnil Goel
    • Mihnea ANDREIColin FlorendoAnil Goel
    • G06F17/30
    • G06F17/30362G06F11/1448G06F17/30309G06F17/30312G06F17/30315G06F17/30339G06F17/30368G06F17/30371G06F2201/80G06F2201/825G06F2201/84G06F2201/87
    • A delta store giving row-level versioning semantics to a non-row-level versioning underlying store is described. An example method includes establishing a column-based in-memory database including a main store and a delta store, where the main store does not allow concurrent transactions on a same table and the delta store has a plurality of row-visibility bitmaps implementing a row-level versioning mechanism that allows concurrent transactions on the same table. A transaction associated with the column-based in-memory database is received. For each table read by the transaction, a version of the table in the delta store that represents a transaction-consistent snapshot of the database visible to the transaction is determined. Each table is represented in the main store and the delta store; and each version of the table is represented by one or more bitmaps. Upon execution of a DML as part of the transaction, for each table written by the transaction, the data changes generated by the transaction is recorded in the one or more bitmaps that represent a private version of the table. Upon commit of the transaction, for each table written by the transaction, a new public version of the table is generated based on the private version of the table, and the public version represents a new transaction-consistent snapshot of the database visible to subsequent transactions.
    • 描述了向非行级版本化底层商店提供行级版本化语义的增量存储。 示例性方法包括建立包括主存储和增量存储的基于列的存储器内数据库,其中主存储不允许同一表上的并发事务,并且增量存储具有实现行的多个行可见性位图 -level版本控制机制允许同一个表上的并发事务。 接收与基于列的内存数据库相关联的事务。 对于由事务读取的每个表,确定delta存储中表示事务可见的数据库的事务一致性快照的表的版本。 每个表在主商店和三角洲商店中表示; 并且表的每个版本由一个或多个位图表示。 在作为事务的一部分执行DML时,对于由事务写入的每个表,由事务生成的数据更改记录在表示该表的私有版本的一个或多个位图中。 在事务提交后,对于由事务编写的每个表,基于表的私有版本生成新的公用版本,而公共版本表示后续事务可见的数据库的新事务一致性快照 。