System and method for adaptive data masking
    21.
    发明授权
    System and method for adaptive data masking 有权
    用于自适应数据屏蔽的系统和方法

    公开(公告)号:US08306932B2

    公开(公告)日:2012-11-06

    申请号:US12384776

    申请日:2009-04-08

    CPC classification number: G06N3/0427 G06N3/08

    Abstract: A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.

    Abstract translation: 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。

    SYSTEM AND A METHOD FOR GENERATING CHALLENGES DYNAMICALLY FOR ASSURANCE OF HUMAN INTERACTION
    22.
    发明申请
    SYSTEM AND A METHOD FOR GENERATING CHALLENGES DYNAMICALLY FOR ASSURANCE OF HUMAN INTERACTION 有权
    系统和一种产生动态挑战的方法来保障人际交往

    公开(公告)号:US20120166409A1

    公开(公告)日:2012-06-28

    申请号:US13072374

    申请日:2011-03-25

    Abstract: The invention provides a method, a system, and a computer program product checking for human interaction dynamically to enable access to a resource in a computing environment. The method comprises collecting a plurality of objects. For each object, a plurality of properties is defined. A set of objects is selected from the plurality of collected objects. Thereafter, queries are generated based on the properties of the selected objects. Queries which have a non-unique or ambiguous response are removed. One of the remaining queries is randomly selected. The answer to the query, based on properties of the selected objects, is stored. The selected set of objects and the selected query are presented to the user who is trying to gain access to the resource. The user is enabled access to the resource if the response received from the user is validated against the stored answer of the selected query.

    Abstract translation: 本发明提供一种方法,系统和计算机程序产品,其动态地检查人类交互以使得能够访问计算环境中的资源。 该方法包括收集多个对象。 对于每个对象,定义了多个属性。 从多个收集的对象中选择一组对象。 此后,基于所选对象的属性生成查询。 具有非唯一或不明确的响应的查询将被删除。 其余的查询之一是随机选择的。 基于所选对象的属性,查询的答案被存储。 所选择的对象集合和所选择的查询被呈现给尝试访问资源的用户。 如果从用户接收到的响应针对存储的所选查询的答案被验证,则用户被启用对资源的访问。

    METHOD FOR MONEY TRANSFER USING A MOBILE DEVICE
    23.
    发明申请
    METHOD FOR MONEY TRANSFER USING A MOBILE DEVICE 审中-公开
    使用移动设备进行货币转移的方法

    公开(公告)号:US20110099107A1

    公开(公告)日:2011-04-28

    申请号:US12814568

    申请日:2010-06-14

    CPC classification number: G06Q20/223 G06Q20/108 G06Q20/32 G06Q20/3223

    Abstract: A method and system to mobile based money transaction across different transaction entity. A non-repudiable message, using a first mobile device, is sent to a first transaction entity expressing to provide a token wherein the mobile device is registered with the first transaction entity. The first transaction entity provides a generated token to the first mobile device using non-repudiable messaging services. The first mobile, in turn, transfers the non-repudiable message to a second mobile device of a second user including a token and a transaction entity code. The second mobile device sends the non-repudiable message to a second transaction entity, indicating a token number, a transaction entity code, and sum of money being transferred. The second transaction entity advances the token number, via a non-repudiable message, to a transaction entity indicated by the transaction code to authenticate the token. The first transaction entity authenticates token on receiving from second transaction entity and money being transferred for genuine token as indicated by first transaction machine. Alternatively, the second transaction entity transfers the equivalent sum of money to the first transaction entity indicating money should be transferred to the linked account of the token.

    Abstract translation: 跨越不同交易实体的基于移动的货币交易的方法和系统。 使用第一移动设备的不可否认消息被发送到表示提供令牌的第一交易实体,其中移动设备向第一交易实体注册。 第一个事务实体使用不可否认的消息服务向第一移动设备提供生成的令牌。 第一移动装置又将不可斥责的消息传送到包括令牌和交易实体代码的第二用户的第二移动设备。 第二移动设备将不可斥责的消息发送到第二交易实体,指示令牌号码,交易实体代码和正在传送的金额的总和。 第二交易实体通过不可斥责的消息将令牌号码递交到由交易代码指示的交易实体来认证令牌。 第一交易实体在从第二交易实体接收到的令牌和第一交易机所指示的兑换正币的货币时进行认证。 或者,第二交易实体将等值的金额转移给第一交易实体,指示货币应该被转移到令牌的链接帐户。

    METHOD FOR PASSWORD BASED AUTHENTICATION TRUST GENERATION AND AUTHORIZATION THEREOF
    24.
    发明申请
    METHOD FOR PASSWORD BASED AUTHENTICATION TRUST GENERATION AND AUTHORIZATION THEREOF 有权
    基于密码的认证信任产生及授权方法

    公开(公告)号:US20100064365A1

    公开(公告)日:2010-03-11

    申请号:US12539703

    申请日:2009-08-12

    CPC classification number: G06F21/31

    Abstract: A method and system is provided to authorize a user to access in a service of higher trust level. The method includes the steps of defining first password, assigning a second password to a user, generating a value for each constituent of second password on operating an exclusivity relationship, calculating the score for the second password on summing the generating value, combining trust levels of multiple users to attain a higher trust level in aggregate, and obtaining access in a service if the aggregated trust level of users are equal to or more than the predetermined trust level of the service. The present technique provides flexibility of authenticating and authorizing a user to access in a service to perform desirable functions thereon. The present technique eliminates the requirement of tokens, pins, dongles etc while attaining a higher trust level to perform a task which belongs to a higher trust level.

    Abstract translation: 提供了一种方法和系统来授权用户访问较高信任级别的服务。 该方法包括以下步骤:定义第一密码,为用户分配第二密码,在操作排他性关系时生成第二密码的每个组成成分的值,在求和生成值时计算第二密码的分数,组合信任级别 多个用户聚合获得更高的信任级别,如果用户的聚合信任级别等于或大于服务的预定信任级别,则获得服务中的访问。 本技术提供了认证和授权用户访问服务以在其上执行所需功能的灵活性。 本技术消除了对令牌,引脚,加密狗等的要求,同时获得更高的信任级别来执行属于更高信任级别的任务。

    System and method for adaptive data masking
    25.
    发明申请
    System and method for adaptive data masking 有权
    用于自适应数据屏蔽的系统和方法

    公开(公告)号:US20090281974A1

    公开(公告)日:2009-11-12

    申请号:US12384776

    申请日:2009-04-08

    CPC classification number: G06N3/0427 G06N3/08

    Abstract: A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.

    Abstract translation: 提供了一种用于数据库的自适应数据屏蔽的方法。 该方法包括从第一数据库中提取数据并提供一个或多个用于掩蔽提取的数据的预定义规则。 该方法还包括使用经过训练的人工神经网络(ANN)掩蔽提取的数据的第一部分,其中训练ANN以掩蔽具有与第一数据库相似的属性的至少一个数据库。 屏蔽和未屏蔽的数据被聚合以得到结构上类似于提取的数据的输出。 该方法还包括确定所提取的数据的到达输出和预期输出之间的偏差值,以及如果偏差值大于预定值,则根据第一数据库的数据屏蔽要求自动修改经训练的ANN。

    Method and system for providing masking services
    26.
    发明授权
    Method and system for providing masking services 有权
    提供掩蔽服务的方法和系统

    公开(公告)号:US08881224B2

    公开(公告)日:2014-11-04

    申请号:US12901769

    申请日:2010-10-11

    Abstract: A system and method for presenting on-demand masking of data as a software service in a distributed environment is provided. An application hosted on a computing device receives request for access to application data from a user. Credentials of the user are first validated in order to determine whether the user is authorized to access the requested application data. For an authorized user, a category of the user is determined to ascertain whether the user is privileged to obtain full access. In case the user is a privileged user, unmasked application data is fetched from a database utility and provided to the user. In case the user is not a privileged user, application data access request is transferred to a data masking service. Application data is fetched from database utility, masked based on pre-defined masking rules and provided to the user.

    Abstract translation: 提供了一种用于在分布式环境中呈现作为软件服务的数据的按需屏蔽的系统和方法。 托管在计算设备上的应用接收来自用户的访问应用数据的请求。 首先验证用户的凭据,以便确定用户是否被授权访问所请求的应用数据。 对于授权用户,确定用户的类别以确定用户是否有权获得完全访问。 如果用户是特权用户,则从数据库实用程序中提取未屏蔽的应用程序数据,并将其提供给用户。 在用户不是特权用户的情况下,应用数据访问请求被传送到数据掩蔽服务。 应用程序数据从数据库实用程序获取,根据预定义的屏蔽规则进行屏蔽,并提供给用户。

    Methods for authenticating a user without personal information and devices thereof
    27.
    发明授权
    Methods for authenticating a user without personal information and devices thereof 有权
    用于认证没有个人信息的用户的方法及其装置

    公开(公告)号:US08516563B2

    公开(公告)日:2013-08-20

    申请号:US13218515

    申请日:2011-08-26

    CPC classification number: G06F21/31 H04L63/08

    Abstract: A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.

    Abstract translation: 在没有个人信息的情况下认证用户的方法,非暂时性计算机可读介质和装置包括在安全认证计算设备处获取上下文标识符,分配给客户端计算设备的多个字符串生成器模块之一的注册标识符 访问和由客户端计算设备生成的客户端字符串,请求从与请求访问的客户端计算设备相关联的代理计算设备进行访问。 基于所获得的上下文标识符和提供给客户计算设备的多个字符串生成器模块中的相应一个,基于注册标识符来请求访问,生成认证字符串。 当客户端字符串匹配认证字符串时,由客户端计算设备请求的访问被授予安全认证计算设备。

    ONE-TIME CREDIT CARD NUMBERS
    28.
    发明申请
    ONE-TIME CREDIT CARD NUMBERS 审中-公开
    一次性信用卡号码

    公开(公告)号:US20120254041A1

    公开(公告)日:2012-10-04

    申请号:US13109946

    申请日:2011-05-17

    CPC classification number: G06Q20/385

    Abstract: Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker.

    Abstract translation: 介绍了与一次性信用卡号相关的各种技术。 一次性信用卡号码可以来自客户设备,并且由客户设备独立生成,而不需要与发行商进行在线通信。 签署的交易详情也可以发送,提供购买交易的不可否认性。 商业基础设施不需要更改,以适应一次性信用卡号码。 这些技术可以特别适用于重放,伪造,中间人和猜测攻击信用卡号码或其他攻击者的攻击。

    SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION
    29.
    发明申请
    SYSTEM AND METHOD FOR MONITORING HUMAN INTERACTION 有权
    用于监测人际交往的系统和方法

    公开(公告)号:US20110209076A1

    公开(公告)日:2011-08-25

    申请号:US12711688

    申请日:2010-02-24

    CPC classification number: G06F21/36

    Abstract: A method & system for human interactive proof (HIP) is provided. A user is provided to respond a query linked to a logical captcha object or an analytical captcha object. Upon receiving inputs from the user, the correct information of the said captcha & the user's input is compared. If the user's input and the correct information of the captcha object matches then the user is authenticated as human, else the user is authenticated as not a human.

    Abstract translation: 提供了人类交互式证明(HIP)的方法和系统。 提供用户来响应链接到逻辑验证码对象或分析验证码对象的查询。 在从用户接收到输入时,比较所述验证码和用户输入的正确信息。 如果用户的输入和验证码对象的正确信息匹配,则用户将被认证为人,否则用户被认证为不是人。

    SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES
    30.
    发明申请
    SOFTWARE LICENSING CONTROL VIA MOBILE DEVICES 审中-公开
    通过移动设备的软件许可控制

    公开(公告)号:US20080262968A1

    公开(公告)日:2008-10-23

    申请号:US12055290

    申请日:2008-03-25

    CPC classification number: G06F21/10

    Abstract: Methods and systems to control a license for a software application are disclosed. The methods and systems can include requesting a central licensing server for initial verification and authentication of at least one user of a software application and sending a identification application from the central licensing server to at least one of the first device or the second device. A license identifier can be generated in the first device or the second device and sent to the central licensing server. The central licensing server can respond by sending a license key generator program to generate a dynamic key. The dynamic key can be input in the second device to execute the software application.

    Abstract translation: 公开了用于控制软件应用的许可证的方法和系统。 方法和系统可以包括请求中央许可服务器进行软件应用程序的至少一个用户的初始验证和认证,并将识别应用从中央许可服务器发送到第一设备或第二设备中的至少一个。 可以在第一设备或第二设备中生成许可标识符,并发送到中央许可服务器。 中央许可服务器可以通过发送许可证密钥生成程序来生成动态密钥来进行响应。 可以在第二设备中输入动态密钥来执行软件应用。

Patent Agency Ranking