METHODS FOR DYNAMIC DESTRUCTION OF DATA IN A REMOTE DATA STORAGE PLATFORM AND DEVICES THEREOF
    3.
    发明申请
    METHODS FOR DYNAMIC DESTRUCTION OF DATA IN A REMOTE DATA STORAGE PLATFORM AND DEVICES THEREOF 有权
    在远程数据存储平台中动态破坏数据的方法及其设备

    公开(公告)号:US20150261964A1

    公开(公告)日:2015-09-17

    申请号:US14635867

    申请日:2015-03-02

    Abstract: The technique relates to a method and apparatus for dynamic destruction of data in a remote data storage platform. This involves receiving a first set of data records with random values and then updating the random values associated with the subsets of the first set of data records into actual values through one or more update operations. After sequential steps of updates, a second set of data records with actual values are obtained. After working of this data for a period of time the owner of the data again begins updating the actual values associated with the subset of the second set of data records into random values. When all the data records are updated to random values the owner of the data successfully ends the Service Level Agreement period.

    Abstract translation: 该技术涉及用于在远程数据存储平台中动态破坏数据的方法和装置。 这包括以随机值接收第一组数据记录,然后通过一个或多个更新操作将与第一组数据记录的子集相关联的随机值更新为实际值。 在更新的顺序步骤之后,获得具有实际值的第二组数据记录。 在数据处理一段时间之后,数据的所有者再次开始将与第二组数据记录的子集相关联的实际值更新为随机值。 当所有数据记录被更新为随机值时,数据所有者成功地终止服务级别协议期限。

    SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION
    4.
    发明申请
    SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION 有权
    检测在线隐私违规的系统和方法

    公开(公告)号:US20150088777A1

    公开(公告)日:2015-03-26

    申请号:US14493316

    申请日:2014-09-22

    CPC classification number: G06Q50/265 G06Q30/01

    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.

    Abstract translation: 本发明涉及一种检测在线隐私违规的方法。 该方法包括以下步骤:将跟踪器嵌入到网络浏览器中以打开至少一个数据消费者网站或至少一个第三方网站,其中用户将至少一个数据值提交到数据消费者网站中的相应数据字段中; 使用跟踪器生成一个或多个隐私简档,其中该简档帮助用户根据用户偏好来选择一个或多个数据字段; 使用跟踪器捕获用户选择的一个或多个数据字段及其相应的多个浏览历史; 将所述简档和所述多个浏览历史存储到至少一个数据库中; 触发跟踪器以检测第三方网站中的在线隐私违规,并将至少一个数据字段提交到至少一个输入字段中,以检测所提交的数据字段的在线隐私违规。

    METHODS FOR COMPUTING AN ALARM TIME AND DEVICES THEREOF
    5.
    发明申请
    METHODS FOR COMPUTING AN ALARM TIME AND DEVICES THEREOF 有权
    用于计算报警时间的方法及其装置

    公开(公告)号:US20150085626A1

    公开(公告)日:2015-03-26

    申请号:US14493800

    申请日:2014-09-23

    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.

    Abstract translation: 本发明描述了用于计算报警时间的系统,方法和计算机产品程序。 该系统包括用于产生报警的报警装置。 该系统还包括驻留在报警装置上的用于提供至少一个用户定义的报警状况的报警应用。 该系统还包括一个报警引擎,用于接收用户定义的报警条件,启动一个探测器从数据源接收数据,处理接收的报警条件和接收到的数据,以计算报警时间和下一个探测时间,重复迭代直到下一个探测时间 小于计算的报警时间。 当下一个探测时间变得大于报警时间时,系统会在计算出的报警时间内产生报警。

    PROVIDING ACCESS OF DIGITAL CONTENTS TO ONLINE DRM USERS
    6.
    发明申请
    PROVIDING ACCESS OF DIGITAL CONTENTS TO ONLINE DRM USERS 审中-公开
    提供数字内容访问在线DRM用户

    公开(公告)号:US20140047557A1

    公开(公告)日:2014-02-13

    申请号:US13941269

    申请日:2013-07-12

    CPC classification number: G06F21/10 H04L63/0428 H04L63/102 H04L2463/101

    Abstract: The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored.

    Abstract translation: 本发明涉及一种由DRM服务器提供一个或多个异构数字内容到至少一个在线数字权限管理(DRM)用户的访问的系统和方法。 本发明涉及从出版商接收数字内容,并且对这些数字内容进行加密,并且授予用户权限以由发行者访问内容。 DRM服务器将解密信息,用户权限和用户信息存储在存储库中。 在通过DRM客户端认证与DRM服务器连接的用户之后,DRM服务器向包括解密信息和用户权限的DRM用户发送许可证。 DRM客户端基于用户计算机设备的存储器中的许可证信息来解密内容,因此内容和许可证不被本地存储。

    System and method for verifying varied electronic signature

    公开(公告)号:US09654295B2

    公开(公告)日:2017-05-16

    申请号:US14845035

    申请日:2015-09-03

    CPC classification number: H04L9/3247 H04L2209/68

    Abstract: The technologies relate to a system and method for electronic signature agnostic verification. The method involves receiving a request to verify an electronic signature, thereafter validating an integrity of the electronic signature on the basis of one or more predefined validation parameters and validation fields, then analyzing the validated electronic signature to obtain one or more features of the validated electronic signature, further decoding the analyzed electronic signature using one or more decode parameters, and finally comparing the decoded electronic signature with a predefined value received from one or more sources, to check the correctness of the decoded electronic signature. The technique supports various electronic signature formats and electronic signature standards.

    Methods for computing an alarm time and devices thereof
    9.
    发明授权
    Methods for computing an alarm time and devices thereof 有权
    计算闹钟时间的方法及其装置

    公开(公告)号:US09563178B2

    公开(公告)日:2017-02-07

    申请号:US14493800

    申请日:2014-09-23

    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is greater than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.

    Abstract translation: 本发明描述了用于计算报警时间的系统,方法和计算机产品程序。 该系统包括用于产生报警的报警装置。 该系统还包括驻留在报警装置上的用于提供至少一个用户定义的报警状况的报警应用。 该系统还包括一个报警引擎,用于接收用户定义的报警条件,启动一个探测器从数据源接收数据,处理接收到的报警条件和接收到的数据,以计算报警时间和下一个探测时间,重复迭代直到下一个探测时间 大于计算出的报警时间。 当下一个探测时间变得大于报警时间时,系统会在计算出的报警时间内产生报警。

    Systems, methods and computer readable media for calculating a security index of an application hosted in a cloud environment
    10.
    发明授权
    Systems, methods and computer readable media for calculating a security index of an application hosted in a cloud environment 有权
    用于计算云环境中托管的应用程序的安全索引的系统,方法和计算机可读介质

    公开(公告)号:US09280669B2

    公开(公告)日:2016-03-08

    申请号:US13891222

    申请日:2013-05-10

    CPC classification number: G06F21/577

    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.

    Abstract translation: 本发明提供了一种用于计算云环境中托管的应用的安全索引的方法和系统。 该应用程序被映射到云环境的云服务提供商,并且识别适用于该应用的一组安全控制和一组安全度量。 一组安全控制和一组安全性度量由安全控制模块封装到安全配置文件对象中。 通过云探测模块从云服务提供商检索一组安全度量值,并计算应用程序的安全索引。

Patent Agency Ranking