SYSTEMS AND METHODS FOR AUTOMATICALLY ASSIGNING USER PERMISSIONS

    公开(公告)号:EP4414878A1

    公开(公告)日:2024-08-14

    申请号:EP24156852.6

    申请日:2024-02-09

    IPC分类号: G06F21/60 H04L9/40

    摘要: A method of updating user permissions includes accessing a permissions database including individual user permissions associated with individual user profiles and assigning initial individual user permissions to an individual user profile; assigning the initial individual user profile to an initial profile tranche based on the initial individual user permissions; updating one or more of the individual user permissions based on information associated with the individual user profile; updating the profile tranche based on the updated individual user permissions.

    DATA AUTHORIZATION EVALUATION FRAMEWORK
    4.
    发明公开

    公开(公告)号:EP4383109A1

    公开(公告)日:2024-06-12

    申请号:EP23208505.0

    申请日:2023-11-08

    申请人: SAP SE

    摘要: Techniques and solutions are provided for evaluating data access restrictions. Data access restrictions are defined for a first computing object that includes data, or is usable to retrieve data, from one or more other computing objects. Data defining the data access restrictions is stored in attributes for a first plurality of computing objects. Values for less than all of the attributes are copied to a second plurality of computing objects, where the second plurality of computing objects is less than the first plurality of computing objects. A data access authorization request is received that includes, or information sufficient to identify, a user or user group identifier, and an identifier of the first computing object. Data is retrieved from at least a portion of one or more computing objects, and is returned in response to the request, or an authorization result is determined and returned in response to the request.

    METHODS AND DEVICES FOR AUTHENTICATION
    5.
    发明公开

    公开(公告)号:EP4372588A1

    公开(公告)日:2024-05-22

    申请号:EP22306706.7

    申请日:2022-11-18

    申请人: Metal Gear

    摘要: One aspect concerns a method carried out by a first device (101) comprising a processor and memory, said method comprising:
    - initiating an authentication session for authenticating a user of the first device with N second devices (1021-102N), with N>=2, and with a third device (103)
    - obtaining (S201) an asymmetric key pair comprising a public key and a private key;
    - obtaining (S203, S204) an identifier for the authentication session from the third device, wherein the identifier is unique to the authentication session;
    - transmitting (S205) the identifier and the public key to the second devices;
    - if a message is received (S208) from any second device indicating this second device received an identical identifier in the past, aborting the authentication session; else receiving first data from the user and carrying out user authentication (S300) with the third device based on the first data;
    - if user authentication fails, aborting the authentication session; else obtaining (S301, S305) a respective challenge from each of the second devices;
    - for each challenge, signing (S307) the challenge with the private key and sending (S308) the signed challenge to the respective second device the challenge was received from;
    - if a message is received (S311, S314, 5316, S319) from any of the second devices indicating that a challenge failed, aborting the authentication session; else receiving a message indicative of successful user authentication from each second device.
    Other aspects concern a method seen from the second device, as well as devices implementing the methods.

    PROVIDING A SECURITY BOUNDARY
    9.
    发明授权

    公开(公告)号:EP2656271B1

    公开(公告)日:2018-09-05

    申请号:EP11850186.5

    申请日:2011-12-20

    IPC分类号: G06F9/44 G06F21/52

    摘要: In order to enable potentially conflicting applications to execute on the same computer, application programming interface (API) calls are intercepted when an application attempts to access a computer system's resources. During a learning mode of operation, a security monitor stores data in a security monitor database identifying which applications are allowed to access the computer system resources. At runtime of an application, the security monitor operates in an enforcement mode and utilizes the contents of the security monitor database to determine if an application is permitted to access system resources. If data associated with the application is located in the security monitor database, the application is allowed to access computer system resources, if data associated with the application is not located in the security monitor database, the application is not allowed to access computer system resources.

    SYSTEM AND METHOD FOR SANDBOXING SUPPORT IN A MULTIDIMENSIONAL DATABASE ENVIRONMENT

    公开(公告)号:EP3365809A1

    公开(公告)日:2018-08-29

    申请号:EP16788912.0

    申请日:2016-10-20

    发明人: BELYAEV, Victor

    IPC分类号: G06F17/30

    摘要: In accordance with an embodiment, described herein is a system and method for providing sandboxing support in a multidimensional database environment. A plurality of sandboxes and a baseline data can be provided in a multidimensional database server, with each sandbox created for a particular “what-if” analysis, and configured to store one or more changes to the baseline data. When a request is received for a report on a particular “what-if” analysis from a client/user, the multidimensional database server can split the request into a first query and the second query, with the first query directed to a sandbox associated with the client/user, and the second query directed to the baseline data. The multidimensional database server can merge results from the first query and the second query, and perform aggregations and calculations on the merged data, before sending the merged data to a client.