TRUSTED FUNCTION BASED DATA ACCESS SECURITY CONTROL
    1.
    发明申请
    TRUSTED FUNCTION BASED DATA ACCESS SECURITY CONTROL 审中-公开
    基于功能的数据访问安全控制

    公开(公告)号:US20160217295A1

    公开(公告)日:2016-07-28

    申请号:US14915971

    申请日:2013-10-31

    CPC classification number: G06F21/6218 G06F21/552 G06F21/6254

    Abstract: According to an example, trusted function based data access security control may include determining a restriction set by a first entity and related to access to and/or analysis related to data under the control of the first entity. A trusted function including meta-data that describes a transformation of the data may be ascertained. A determination may be made as to whether the meta-data of the trusted function matches the restriction related to the access to and/or analysis related to the data. In response to a determination that the meta-data of the trusted function matches the restriction, the trusted function may be executed to allow controlled access to the data by a second entity. In response to a determination that the meta-data of the trusted function does not match the restriction, execution of the trusted function may be prevented to prevent access to the data by the second entity.

    Abstract translation: 根据一个示例,基于信任功能的数据访问安全控制可以包括确定第一实体的限制集合并且与在第一实体的控制下与数据有关的访问和/或分析相关。 可以确定包括描述数据变换的元数据的可信函数。 可以确定信任功能的元数据是否与对与数据有关的访问和/或分析相关的限制进行匹配。 响应于可信功能的元数据与该限制匹配的确定,可以执行可信函数以允许第二实体对数据的受控访问。 响应于可信函数的元数据与限制不匹配的确定,可以防止可信函数的执行以防止第二实体访问数据。

    Semantic restriction
    3.
    发明授权

    公开(公告)号:US10192066B2

    公开(公告)日:2019-01-29

    申请号:US15125675

    申请日:2014-03-14

    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a semantic restriction associated with a semantic term of the environment, a tracker engine to track the procedure during execution, and a control engine to maintain execution of the procedure based on the restriction and trace information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a procedure to access the set of data, receiving a semantic restriction associated with a semantic term of the environment, tracing the procedure during execution, and providing a view of the set of data based on the restriction and a semantic mapping of trace information.

    Resource restriction
    7.
    发明授权

    公开(公告)号:US10193892B2

    公开(公告)日:2019-01-29

    申请号:US15116851

    申请日:2014-03-14

    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a restriction associated with a resource of the environment, a monitor engine to maintain resource utilization information, and a control engine to limit execution of the procedure based on the restriction and the resource utilization information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a restriction associated with a resource of the environment, receiving a procedure to access the set of data, ascertaining resource utilization information, and providing a view of the set of data based on the restriction and the resource utilization information.

    STORING AND RETRIEVING CIPHERTEXT IN DATA STORAGE
    9.
    发明申请
    STORING AND RETRIEVING CIPHERTEXT IN DATA STORAGE 审中-公开
    存储和检索数据存储中的CIPHERTEXT

    公开(公告)号:US20160344553A1

    公开(公告)日:2016-11-24

    申请号:US15114921

    申请日:2014-04-04

    Abstract: Storing and retrieving ciphertext in data storage can include determining a first ciphertext value for a first data chunk to be saved to a client-server data storage system using an encrypted chunk hash value associated with the first data chunk as an initial value, and storing the first data chunk on a server in the client-server data storage system in response to determining that the first ciphertext value is a unique ciphertext value. Also, storing and retrieving ciphertext in data storage can include decrypting a ciphertext value for a second data chunk received from a client in the client-server data storage system and based on an encrypted chunk hash value associated with the second data chunk, and sending the second data chunk to the client in response to determining that the decrypted ciphertext value corresponds to an original data chunk saved to the server by the client.

    Abstract translation: 在数据存储中存储和检索密文可以包括使用与第一数据块相关联的加密块哈希值作为初始值来确定要保存到客户端 - 服务器数据存储系统的第一数据块的第一密文值,并存储 响应于确定第一密文值是唯一的密文值,在客户机 - 服务器数据存储系统中的服务器上的第一数据块。 此外,在数据存储中存储和检索密文可以包括解密从客户机 - 服务器数据存储系统中的客户端接收的第二数据块的密文值,并且基于与第二数据块相关联的加密块哈希值, 响应于确定解密的密文值对应于由客户端保存到服务器的原始数据块,向客户端发送第二数据块。

Patent Agency Ranking