Fingerprinting a database
    1.
    发明授权
    Fingerprinting a database 有权
    指纹数据库

    公开(公告)号:US08296342B2

    公开(公告)日:2012-10-23

    申请号:US12551402

    申请日:2009-08-31

    IPC分类号: G06F17/30 G06F17/00

    CPC分类号: G06F17/30595 G06F21/64

    摘要: A method comprising fingerprinting, by the at least one processor, a first copy of a database with a fingerprint. The fingerprint has at least one part in common with another fingerprint used in another copy of the database, and at least one part unique to the first copy of the database. The fingerprinting comprises swapping attributes between multiple records in the first copy of the database.

    摘要翻译: 一种方法,包括由所述至少一个处理器用指纹指纹化数据库的第一副本。 指纹与数据库的另一个副本中使用的另一个指纹至少有一部分共同,以及数据库的第一个副本唯一的至少一个部分。 指纹包括在数据库的第一个副本中的多个记录之间交换属性。

    FINGERPRINTING A DATABASE
    2.
    发明申请
    FINGERPRINTING A DATABASE 有权
    指纹数据库

    公开(公告)号:US20110055166A1

    公开(公告)日:2011-03-03

    申请号:US12551402

    申请日:2009-08-31

    IPC分类号: G06F12/00

    CPC分类号: G06F17/30595 G06F21/64

    摘要: A method comprising fingerprinting, by the at least one processor, a first copy of a database with a fingerprint. The fingerprint has at least one part in common with another fingerprint used in another copy of the database, and at least one part unique to the first copy of the database. The fingerprinting comprises swapping attributes between multiple records in the first copy of the database.

    摘要翻译: 一种方法,包括由所述至少一个处理器用指纹指纹化数据库的第一副本。 指纹与数据库的另一个副本中使用的另一个指纹至少有一部分共同,以及数据库的第一个副本唯一的至少一个部分。 指纹包括在数据库的第一个副本中的多个记录之间交换属性。

    Permuting records in a database for leak detection and tracing
    3.
    发明授权
    Permuting records in a database for leak detection and tracing 有权
    在数据库中记录泄漏检测和跟踪

    公开(公告)号:US08412755B2

    公开(公告)日:2013-04-02

    申请号:US12490091

    申请日:2009-06-23

    IPC分类号: G06F17/00 G06F17/30

    摘要: A method comprises receiving, by a processor, a copy of a database containing records, each record having a plurality of attributes. The method also comprises determining, by the processor, whether a first attribute in each record results in a predetermined value in modulo P when hashed with a key and determining, by the processor, whether a second attribute in each record results in the predetermined value in modulo P when hashed with a key. For a first record whose first attribute results in the predetermined value in modulo P when hashed with a key and a second record whose second attribute also results in the predetermined value in modulo P when hashed with a key, the method further comprises swapping by the processor the second attributes between the first and second records.

    摘要翻译: 一种方法包括由处理器接收包含记录的数据库的副本,每个记录具有多个属性。 该方法还包括由处理器确定当利用密钥进行散列时每个记录中的第一属性是否以模P形成预定值,并且由处理器确定每个记录中的第二属性是否导致预定值 用键进行散列时的模P。 对于第一个记录,其第一个属性在使用密钥进行散列时产生模P中的预定值,而第二个记录的第二个属性在使用密钥进行散列时也导致模P中的预定值,该方法还包括由处理器 第一和第二个记录之间的第二个属性。

    Artificial record added to a database
    4.
    发明授权
    Artificial record added to a database 有权
    将人工记录添加到数据库

    公开(公告)号:US08117220B2

    公开(公告)日:2012-02-14

    申请号:US12433791

    申请日:2009-04-30

    IPC分类号: G06F17/30

    摘要: A method comprises receiving a database containing records. The method further comprises determining a number of artificial records to add to the database to achieve a false negative mark detection rate less than a specified threshold. The method also comprises marking the database by adding the determined number of artificial records to the database. Each artificial record contains at least one value that, when used, is detectable by a third party. The false negative rate comprises a probability of failing to detect the mark in a discovered subset of the database.

    摘要翻译: 一种方法包括接收包含记录的数据库。 该方法还包括确定要添加到数据库中的人造记录的数量,以获得小于指定阈值的假阴性标记检测率。 该方法还包括通过将确定数量的人造记录添加到数据库来标记数据库。 每个人工记录包含至少一个值,当使用时,它可被第三方检测到。 假阴性率包括在数据库的发现子集中检测不到标记的概率。

    Data assurance
    7.
    发明授权
    Data assurance 有权
    数据保证

    公开(公告)号:US08656452B2

    公开(公告)日:2014-02-18

    申请号:US12840185

    申请日:2010-07-20

    IPC分类号: G06F17/00 H04L29/06

    CPC分类号: G06Q30/06

    摘要: Data assurance capabilities are received that are related to at least one individual persistent object type in a plurality of persistent object types linked to persistent objects stored on the service provider server. In addition, data assurance specifications are received from a customer, the data assurance specifications being based on the data assurance capabilities. Computer-readable data assurance policies for the at least one persistent object type are generated based on the received data assurance specification. The computer-readable data assurance policies then are combined with a corresponding template of data assurance capabilities for the at least one individual persistent object type to generate an enforceable customer-specific data policy.

    摘要翻译: 接收与多个持久对象类型中至少一个持久对象类型相关联的数据保证能力,该持久对象类型链接到存储在服务提供者服务器上的持久对象。 此外,从客户接收数据保证规范,数据保证规范基于数据保证能力。 基于接收的数据保证规范生成用于至少一个持久对象类型的计算机可读数据保证策略。 然后将计算机可读数据保护策略与用于至少一个单独持久对象类型的数据保证能力的相应模板组合以生成可执行的客户特定数据策略。

    Model Based Deployment Of Computer Based Business Process On Dedicated Hardware
    9.
    发明申请
    Model Based Deployment Of Computer Based Business Process On Dedicated Hardware 审中-公开
    基于计算机的业务流程在专用硬件上的基于模型的部署

    公开(公告)号:US20110004564A1

    公开(公告)日:2011-01-06

    申请号:US12808229

    申请日:2007-12-20

    IPC分类号: G06Q10/00

    CPC分类号: G06Q10/06 G06Q10/067

    摘要: A method of automated deployment managed by a service provider, of a computer based business process, involves generating a model (730) of the business process including a design of computing infrastructure, and deploying the model on hardware (770) dedicated to the enterprise, with an interface for the service provider to enable ongoing management of the deployed process by the service provider. Having dedicated hardware means the location of the hardware can be arranged to suit the enterprise. This means limitations such as bandwidth or latency of WAN links, can be addressed by choosing the location of the dedicated hardware appropriately. Trust of security can also be increased compared to that of the shared data centres. The automated model driven deployment can help enable the service provider to provide such deployments on different types of hardware. The need for the enterprise to maintain specialist expertise in house is reduced.

    摘要翻译: 由基于计算机的业务过程的服务提供商管理的自动部署的方法涉及生成业务流程的模型(730),包括计算基础设施的设计,以及在该企业专用的硬件(770)上部署该模型, 具有用于服务提供商的接口,以允许服务提供商对所部署的进程的持续管理。 具有专用硬件意味着硬件的位置可以安排适合企业。 这意味着可以通过适当地选择专用硬件的位置来解决诸如WAN链路的带宽或延迟的限制。 与共享数据中心相比,安全性的信任度也可以增加。 自动化模型驱动部署可以帮助服务提供商在不同类型的硬件上提供这样的部署。 减少了企业在家里保持专业知识的需求。

    Methods for Secure Data Distribution
    10.
    发明申请
    Methods for Secure Data Distribution 有权
    安全数据分发方法

    公开(公告)号:US20100186067A1

    公开(公告)日:2010-07-22

    申请号:US12357745

    申请日:2009-01-22

    IPC分类号: G06F21/00 G06F17/30

    摘要: A method for secure distribution of data in an interchange network, comprises having a network in which data records stored on at least one computer; and including an authorization service, where the authorization service grants a contractor access to at least a portion of the data records; and a watermarking module that adds one or more artificial records to said portion. The artificial records cannot be distinguished from the data records by the contractor and are valid for processing in the same way as the data records.

    摘要翻译: 一种用于在交换网络中安全地分发数据的方法,包括:具有存储在至少一台计算机上的数据记录的网络; 并且包括授权服务,其中授权服务授权承包商访问至少一部分数据记录; 以及将一个或多个人造记录添加到所述部分的水印模块。 人造记录不能与承包商与数据记录区分开,并且以与数据记录相同的方式处理。