会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and apparatus for managing cryptographic keys
    • 用于管理加密密钥的方法和装置
    • US07925023B2
    • 2011-04-12
    • US11367812
    • 2006-03-03
    • Paul YounDaniel ManHung WongMin-Hank HoChon Hei Lei
    • Paul YounDaniel ManHung WongMin-Hank HoChon Hei Lei
    • H04L9/08
    • H04L9/3234H04L9/083H04L9/3239H04L63/06H04L63/0807
    • One embodiment of the present invention provides a system for managing keys. During operation, the system authenticates a client at a key manager. Next, the system receives a token from the client at the key manager, wherein the token is associated with a customer key, and includes a token authenticator. This token authenticator comprises one-half of an authenticator pair which is used to determine if the client is the owner of the customer key. Next, the system decrypts the token using a master key. The system then verifies a client authenticator, which comprises the other half of the authenticator pair which is used to determine if the client is the owner of the customer key. If the client is the owner of the customer key, the system sends the customer key to the client, which enables the client to encrypt/decrypt data. Finally, the client deletes the customer key.
    • 本发明的一个实施例提供一种用于管理密钥的系统。 在运行期间,系统会在密钥管理器身份验证客户端。 接下来,系统在密钥管理器处从客户端接收令牌,其中令牌与客户密钥相关联,并且包括令牌认证器。 该令牌认证器包括认证器对的一半,用于确定客户端是客户密钥的所有者。 接下来,系统使用主密钥解密令牌。 然后,系统验证客户端认证器,客户端认证器包括用于确定客户端是否是客户密钥的所有者的认证器对的另一半。 如果客户端是客户密钥的所有者,则系统将客户密钥发送给客户端,这使得客户端能够对数据进行加密/解密。 最后,客户端删除客户密钥。
    • 4. 发明授权
    • Data masking with an encrypted seed
    • 使用加密的种子进行数据屏蔽
    • US08375224B2
    • 2013-02-12
    • US12616127
    • 2009-11-10
    • Paul YounDaniel ManHung Wong
    • Paul YounDaniel ManHung Wong
    • G06F21/00
    • G06F21/6218
    • A method and apparatus is provided for generating a masked value from a cryptographically transformed value by using the cryptographically transformed value as a random seed, without decrypting the cryptographically transformed value. A query is evaluated against a set of data to produce a result. The result may be cryptographically transformed or unencrypted. If the result is unencrypted, the result may be cryptographically transformed to produce a random seed. If the result is already cryptographically transformed, then the result is used as the random seed. The random seed is used to generate a masked value, without decrypting the cryptographically transformed random seed value. The masked value conforms to a particular data characteristic such as a data format or a data type, which may be determined from metadata stored in a database, received with a query, or gleaned from unencrypted data. The masked value is returned as a result of the query.
    • 提供了一种方法和装置,用于通过使用加密变换的值作为随机种子从密码变换的值生成掩蔽值,而不对密码变换的值进行解密。 对一组数据进行查询以产生结果。 结果可能是加密转换或未加密的。 如果结果未被加密,则结果可能被加密地转换以产生随机种子。 如果结果已被加密地转换,则结果被用作随机种子。 随机种子用于生成掩蔽值,而不对密码变换的随机种子值进行解密。 掩蔽值符合诸如数据格式或数据类型的特定数据特征,其可以从存储在数据库中的元数据中,通过查询接收到的元数据确定,或从未加密的数据中收集。 作为查询的结果返回被屏蔽的值。
    • 6. 发明授权
    • Method and apparatus for using an external security device to secure data in a database
    • 使用外部安全设备来保护数据库中的数据的方法和装置
    • US07639819B2
    • 2009-12-29
    • US11156307
    • 2005-06-16
    • Min-Hank HoPaul YounDaniel ManHung WongChon Lei
    • Min-Hank HoPaul YounDaniel ManHung WongChon Lei
    • H04L9/00
    • G06F21/6227G06F2221/2153H04L9/0822H04L9/0897
    • One embodiment of the present invention provides a system that facilitates using an external security device to secure data in a database without having to modify database applications. The system operates by receiving a request at the database to perform an encryption/decryption operation, wherein the encryption/decryption operation is performed with the assistance of the external security module in a manner that is transparent to database applications. In response to the request, the system passes a wrapped (encrypted) column key (a key used to encrypt data within the database) to an external security module, wherein the wrapped column key is a column key encrypted with a master key that exists only within the external security module. The system then unwraps (decrypts) the wrapped column key in the external security module to retrieve the column key. Next, the system returns the column key to the database. The system then performs an encryption/decryption operation on data in the database using the column key. Finally, the system erases the column key from memory in the database.
    • 本发明的一个实施例提供一种便于使用外部安全设备来保护数据库中的数据而不必修改数据库应用的系统。 该系统通过在数据库处接收请求来执行加密/解密操作,其中以对数据库应用是透明的方式在外部安全模块的帮助下执行加密/解密操作。 响应于该请求,系统将包裹的(加密的)列密钥(用于将数据库内的数据加密的密钥)传递到外部安全模块,其中包装的列密钥是仅使用主密钥加密的列密钥 在外部安全模块内。 系统然后在外部安全模块中解包(解密)包装的列密钥以检索列密钥。 接下来,系统将列键返回到数据库。 然后,系统使用列键对数据库中的数据执行加密/解密操作。 最后,系统从数据库中的内存中擦除列密钥。
    • 8. 发明申请
    • DATA MASKING WITH AN ENCRYPTED SEED
    • 数据用加密种子进行掩蔽
    • US20110113050A1
    • 2011-05-12
    • US12616127
    • 2009-11-10
    • Paul YounDaniel ManHung Wong
    • Paul YounDaniel ManHung Wong
    • G06F17/30G06F7/00
    • G06F21/6218
    • A method and apparatus is provided for generating a masked value from a cryptographically transformed value by using the cryptographically transformed value as a random seed, without decrypting the cryptographically transformed value. A query is evaluated against a set of data to produce a result. The result may be cryptographically transformed or unencrypted. If the result is unencrypted, the result may be cryptographically transformed to produce a random seed. If the result is already cryptographically transformed, then the result is used as the random seed. The random seed is used to generate a masked value, without decrypting the cryptographically transformed random seed value. The masked value conforms to a particular data characteristic such as a data format or a data type, which may be determined from metadata stored in a database, received with a query, or gleaned from unencrypted data. The masked value is returned as a result of the query.
    • 提供了一种方法和装置,用于通过使用加密变换的值作为随机种子从密码变换的值生成掩蔽值,而不对密码变换的值进行解密。 对一组数据进行查询以产生结果。 结果可能是加密转换或未加密的。 如果结果未被加密,则结果可能被加密地转换以产生随机种子。 如果结果已被加密地转换,则结果被用作随机种子。 随机种子用于生成掩蔽值,而不对密码变换的随机种子值进行解密。 掩蔽值符合诸如数据格式或数据类型的特定数据特征,其可以从存储在数据库中的元数据中,通过查询接收到的元数据确定,或从未加密的数据中收集。 作为查询的结果返回被屏蔽的值。
    • 9. 发明授权
    • Method and apparatus for performing selective encryption/decryption in a data storage system
    • 用于在数据存储系统中执行选择性加密/解密的方法和装置
    • US08892905B2
    • 2014-11-18
    • US11726428
    • 2007-03-21
    • Adam Y. LeeVarun MalhotraDaniel ManHung WongTirthankar LahiriKiran GoyalJuan R. LoaizaPaul Youn
    • Adam Y. LeeVarun MalhotraDaniel ManHung WongTirthankar LahiriKiran GoyalJuan R. LoaizaPaul Youn
    • G06Q30/02H04L9/08
    • H04L9/0894
    • One embodiment of the present invention provides a system for performing selective encryption/decryption in a data storage system. During operation, the system receives a data block from a storage medium at an input/output layer, wherein the input/output layer serves as an interface between the storage medium and a buffer cache. Next, the system determines whether the data block is an encrypted data block. If not, the system stores the data block in the buffer cache. Otherwise, if the data block is an encrypted data block, the system retrieves a storage-key, wherein the storage-key is associated with a subset of storage, which is associated with the encrypted data block. Using the storage-key, the system then decrypts the encrypted data block to produce a decrypted data block. Finally, the system stores the decrypted data block in the buffer cache, wherein the data block remains encrypted in the storage medium.
    • 本发明的一个实施例提供一种用于在数据存储系统中执行选择性加密/解密的系统。 在操作期间,系统在输入/输出层从存储介质接收数据块,其中输入/输出层用作存储介质和缓冲器高速缓存之间的接口。 接下来,系统确定数据块是否是加密数据块。 如果没有,系统将数据块存储在缓冲区高速缓存中。 否则,如果数据块是加密数据块,则系统检索存储密钥,其中存储密钥与与加密数据块相关联的存储子集相关联。 使用存储密钥,系统然后解密加密的数据块以产生解密的数据块。 最后,系统将解密的数据块存储在缓冲器高速缓存中,其中数据块在存储介质中保持加密。
    • 10. 发明授权
    • Method and apparatus for authorizing a database operation
    • 用于授权数据库操作的方法和装置
    • US07770006B2
    • 2010-08-03
    • US11139709
    • 2005-05-26
    • Daniel ManHung WongMingKang XuPaul YounMinHank HoChon Hei Lei
    • Daniel ManHung WongMingKang XuPaul YounMinHank HoChon Hei Lei
    • H04L9/32G06F21/00G06F17/30
    • H04L9/085G06F21/6218G06F2221/2115Y10S707/99931
    • One embodiment of the present invention provides a system that authorizes a sensitive database operation. During operation, the system receives a request to perform a sensitive database operation. Note that, a sensitive database operation is an operation which, in the hands of a malicious user, poses a serious security threat. Next, the system determines a multiparty authorization requirement for the sensitive database operation, wherein the multiparty authorization requirement specifies a set of approvals required for authorizing the sensitive database operation. The system then sends approval requests to one or more approving parties based on the multiparty authorization requirement. Next, the system receives approvals for authorizing the sensitive database operation. The system then determines whether the approvals satisfy the multiparty authorization requirement. Next, if the approvals satisfy the multiparty authorization requirement, the system authorizes the sensitive database operation, thereby allowing the database to perform the sensitive database operation.
    • 本发明的一个实施例提供了授权敏感数据库操作的系统。 在操作期间,系统接收到执行敏感数据库操作的请求。 请注意,敏感数据库操作是在恶意用户手中造成严重安全威胁的操作。 接下来,系统确定敏感数据库操作的多方授权要求,其中多方授权要求指定了授权敏感数据库操作所需的一组批准。 系统然后根据多方授权要求向一个或多个批准方发出批准请求。 接下来,系统接收授权敏感数据库操作的批准。 然后,系统确定批准是否满足多方授权要求。 接下来,如果批准满足多方授权要求,则系统授权敏感数据库操作,从而允许数据库执行敏感数据库操作。