Computer-implemented method for role discovery in access control systems
    31.
    发明授权
    Computer-implemented method for role discovery in access control systems 有权
    用于访问控制系统中角色发现的计算机实现方法

    公开(公告)号:US09405921B1

    公开(公告)日:2016-08-02

    申请号:US11888381

    申请日:2007-07-31

    IPC分类号: G06F21/62

    摘要: One embodiment relates to a computer-implemented method for role discovery in access control systems. User accounts are selected according to a predetermined algorithm. For each selected user account, a new role is created covering a set of permissions including all permissions which the user account needs but is not yet covered by another role that the user account has. The new role is given to the user account so that all permissions needed by the user account are covered. Any additional user accounts which still need the set of permissions covered by the new role are also found, and the new role is given to these additional user accounts, if any. Other features, aspects and embodiments are also disclosed.

    摘要翻译: 一个实施例涉及用于访问控制系统中角色发现的计算机实现的方法。 根据预定算法选择用户账户。 对于每个选定的用户帐户,创建一个新角色,覆盖一组权限,包括用户帐户所需的所有权限,但尚未被用户帐户所具有的其他角色覆盖。 给用户帐户赋予新角色,以覆盖用户帐户所需的所有权限。 还会找到仍然需要新角色所涵盖的一组权限的任何其他用户帐户,并将新角色授予这些其他用户帐户(如果有)。 还公开了其它特征,方面和实施例。

    COST ENTITY MATCHING
    32.
    发明申请
    COST ENTITY MATCHING 有权
    成本实体匹配

    公开(公告)号:US20130290049A1

    公开(公告)日:2013-10-31

    申请号:US13456610

    申请日:2012-04-26

    IPC分类号: G06Q10/06

    CPC分类号: G06Q10/06311

    摘要: A method for cost entity matching can include constructing a first graph including a number of first entities and a number of second entities, and assigning a number of first cost values to each of a number of first edges connecting one of the number of first entities to one of the number of second entities in the first graph; adding a second graph to the first graph, wherein the second graph includes the number of first entities and the number of second entities, and assigning a second cost value to each of a number of second edges connecting one of the number of first entities in the first graph to the corresponding first entity in the second graph; and, matching each one of the number of second entities to one of the number of first entities based on the number of first cost values and the second cost values.

    摘要翻译: 一种用于成本实体匹配的方法可以包括构建包括多个第一实体和多个第二实体的第一图形,并且将多个第一成本值分配给连接多个第一实体之一的多个第一边缘中的每一个, 第一个图形中第二个实体的数量之一; 向所述第一图形添加第二图形,其中所述第二图形包括所述第一实体的数量和所述第二实体的数量,并且将第二成本值分配给连接所述第一实体中的所述第一实体之一的多个第二边缘中的每一个 第一个图形到第二个图形中相应的第一个实体; 并且基于第一成本值和第二成本值的数量,将第二实体的数量中的每一个与第一实体的数量相匹配。

    Software Self-Defense Systems and Methods
    34.
    发明申请
    Software Self-Defense Systems and Methods 有权
    软件自卫系统与方法

    公开(公告)号:US20110035733A1

    公开(公告)日:2011-02-10

    申请号:US12854685

    申请日:2010-08-11

    IPC分类号: G06F9/45 G06F12/14

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。

    Computer-Implemented Method for Obtaining a Minimum Biclique Cover in a Bipartite Dataset
    36.
    发明申请
    Computer-Implemented Method for Obtaining a Minimum Biclique Cover in a Bipartite Dataset 有权
    计算机实现的双向数据集中获取最小双面覆盖的方法

    公开(公告)号:US20100175111A1

    公开(公告)日:2010-07-08

    申请号:US12350130

    申请日:2009-01-07

    IPC分类号: H04L9/32 G06F17/10

    CPC分类号: G06F17/10

    摘要: A method includes providing a bipartite graph having vertices of a first type, vertices of a second type, and a plurality of edges, wherein each edge joins a vertex of the first type with a vertex of the second type. A unipartite edge dual graph is generated from the bipartite graph, and a minimum clique partition of the edge dual graph is recursively determined. A biclique is then created in the bipartite graph corresponding to each clique in the minimum clique partition of the edge dual graph.

    摘要翻译: 一种方法包括提供具有第一类型的顶点,第二类型的顶点和多个边缘的二分图,其中每个边缘将第一类型的顶点与第二类型的顶点相连接。 从二分图生成一个单边缘双图,并递归地确定边缘双图的最小分区。 然后在对应于边缘双图的最小集团分区中的每个团体的二分图中创建双面。

    Identifying a minimum cut and/or a maximum flow using balancing of vertex excesses
    37.
    发明授权
    Identifying a minimum cut and/or a maximum flow using balancing of vertex excesses 有权
    使用平衡顶点过剩来识别最小切割和/或最大流量

    公开(公告)号:US07680641B1

    公开(公告)日:2010-03-16

    申请号:US11450706

    申请日:2006-06-09

    IPC分类号: G06F17/50

    摘要: A representation of a network having vertices connected by arcs is provided, where the network exhibits a pseudoflow. Arcs on which moves are to be performed are iteratively chosen for balancing excesses of vertices across the arcs until a stopping rule is satisfied. After the stopping rule is satisfied, further processing is performed to identify at least one of a minimum cut and/or maximum flow.

    摘要翻译: 提供具有通过弧连接的顶点的网络的表示,其中网络呈现伪浪。 要对其进行移动的弧进行迭代选择,以平衡跨弧的顶点过多直到达到停止规则。 在满足停止规则之后,执行进一步的处理以识别最小切割和/或最大流动中的至少一个。

    Software self-defense systems and methods
    40.
    发明授权
    Software self-defense systems and methods 有权
    软件自卫系统和方法

    公开(公告)号:US07430670B1

    公开(公告)日:2008-09-30

    申请号:US09629546

    申请日:2000-07-31

    IPC分类号: G06F12/14

    摘要: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.

    摘要翻译: 公开了用于保护计算机程序免于未经授权的分析和修改的系统和方法。 混淆变换可以应用于计算机程序的本地结构,控制图和/或数据结构,以使程序更难于理解和/或修改。 防篡改机制可以并入计算机程序中,以检测篡改程序操作的尝试。 一旦检测到篡改计算机程序的尝试,则计算机程序将其报告给外部代理,停止正常操作,和/或反转由所尝试的篡改所做的任何修改。 计算机程序也可以加水印以便于其所有者的识别。 混淆,防篡改和水印变换可以应用于计算机程序的源代码,目标代码或可执行映像。