VERIFIABLE REDACTABLE AUDIT LOG
    1.
    发明申请

    公开(公告)号:US20210258146A1

    公开(公告)日:2021-08-19

    申请号:US17308370

    申请日:2021-05-05

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    VERIFIABLE REDACTABLE AUDIT LOG
    3.
    发明申请
    VERIFIABLE REDACTABLE AUDIT LOG 有权
    可验证的可缩减的审核日志

    公开(公告)号:US20150188715A1

    公开(公告)日:2015-07-02

    申请号:US14223918

    申请日:2014-03-24

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    Abstract translation: 在一些实施例中,可验证的可修改日志,其在每个条目中可以包含多个哈希值,以便将日志的机密性确认为可验证性。 可以使用重新计算散列和验证可信数字签名来验证日志。 在一些实施例中,日志可以被划分成段,每个段由时间服务器签名或使用临时密钥系统进行自签名。 在一些实施例中,关于特定对象或事件的日志消息可以嵌套在日志内以防止报告省略。 日志记录系统可能会收到进入日志的事件或消息。

    Verifiable redactable audit log
    4.
    发明授权

    公开(公告)号:US11032065B2

    公开(公告)日:2021-06-08

    申请号:US16009094

    申请日:2018-06-14

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    Verifiable redactable audit log
    5.
    发明授权
    Verifiable redactable audit log 有权
    可验证的可重新审核日志

    公开(公告)号:US09338013B2

    公开(公告)日:2016-05-10

    申请号:US14223918

    申请日:2014-03-24

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    Abstract translation: 在一些实施例中,可验证的可修改日志,其在每个条目中可以包含多个哈希值,以便将日志的机密性确认为可验证性。 可以使用重新计算散列和验证可信数字签名来验证日志。 在一些实施例中,日志可以被划分成段,每个段由时间服务器签名或使用临时密钥系统进行自签名。 在一些实施例中,关于特定对象或事件的日志消息可以嵌套在日志内以防止报告省略。 日志记录系统可能会收到进入日志的事件或消息。

    VERIFIABLE REDACTABLE AUDIT LOG
    7.
    发明申请

    公开(公告)号:US20180302216A1

    公开(公告)日:2018-10-18

    申请号:US16009094

    申请日:2018-06-14

    Abstract: A verifiable, redactable log, which, in some embodiments, may contain multiple hash values per entry in order to sever confidentiality of a log from verifiability. Logs may be verified using recalculation of hashes and verification of trusted digital signatures. In some embodiments, the log may be divided into segments, each signed by a time server or self-signed using a system of ephemeral keys. In some embodiments, log messages regarding specific objects or events may be nested within the log to prevent reporting omission. The logging system may receive events or messages to enter into the log.

    System and method for monitoring authentication attempts
    9.
    发明授权
    System and method for monitoring authentication attempts 有权
    用于监控认证尝试的系统和方法

    公开(公告)号:US08763078B1

    公开(公告)日:2014-06-24

    申请号:US13827201

    申请日:2013-03-14

    CPC classification number: H04L63/08 H04L63/1408 H04L63/1441

    Abstract: When an authentication attempt is made to gain access to a secure environment is made, a notification is transmitted to the user associated with the user identification used in the authentication attempt. If the user who receives the notification did not make the authentication attempt, then the user alerts the appropriate parties of a breach in security.

    Abstract translation: 当进行认证尝试以获得对安全环境的访问时,向与认证尝试中使用的用户标识相关联的用户发送通知。 如果接收到通知的用户没有进行认证尝试,则用户在安全性中提醒违规的对方。

Patent Agency Ranking