Multi-party data science collaboration

    公开(公告)号:US11669597B1

    公开(公告)日:2023-06-06

    申请号:US17409460

    申请日:2021-08-23

    Applicant: Hubbert Smith

    Inventor: Hubbert Smith

    CPC classification number: G06F21/10 G06F21/6236 H04L63/101 H04L63/102

    Abstract: The disclosure includes a system and method for multiparty collaboration including creating a first data object associated with first collaboration data, the first collaboration data associated with a first collaborating entity; generating a first object ownership log entry to an object ownership log associated with a collaboration, the first object ownership log entry including first identification information identifying the first data object and a first object owner identifying an owner of the first data object, wherein the first object owner associated with the first data object is the first collaborating entity; generating a first object tracking index entry associated with the first data object; receiving a user request associated with the first data object; and responding to the user request based on one or more of a user whitelist, the object ownership log, and the ownership tracking index.

    Methods and apparatus for dynamic data access provisioning

    公开(公告)号:US11663356B1

    公开(公告)日:2023-05-30

    申请号:US17150150

    申请日:2021-01-15

    Applicant: Fannie Mae

    Abstract: According to one aspect of this disclosure, dynamic access provisioning provides a centralized, flexible and consistent mechanism to grant access rights to data in real-time by dynamically evaluating access policies that involve user, data and environmental attributes. The mechanism handles complex authorization policies involving numerous different user types with differing access needs and rights, as well as numerous different data sources with differing access requirements. The mechanism also simplifies data usage by providing a single-context experience in a user session, giving access to data from multiple diverse data sources in one access context. Data could be in different domains or project spaces. Users (or the data access apps they create in the session) are not required to switch access contexts to access all the data they are entitled to. The system is also scalable, in that additional data users and data producers may be easily added to the dynamic access provisioning environment.

    System and Method for Application Route Management

    公开(公告)号:US20180219866A1

    公开(公告)日:2018-08-02

    申请号:US15421734

    申请日:2017-02-01

    Abstract: The unauthorized access of database nodes by application nodes within an electronic computing and communications system can be prevented using an access table that stores access table records indicating that at least some of the application nodes are authorized to access at least some of the database nodes. The access table records can be generated by identifying connections between application nodes and database nodes within a configuration management database. Responsive to receiving a request to access a database node sent from a first application node, the access table can be queried to determine whether an access table record indicating that the first application node is authorized to access the database node is stored in the access table. If that access table record is not stored in the access table, the request is denied. Otherwise, the request is allowed.

    SECURE DATA REPLICATION
    10.
    发明申请

    公开(公告)号:US20180107727A1

    公开(公告)日:2018-04-19

    申请号:US15820979

    申请日:2017-11-22

    Applicant: NetApp Inc.

    Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.

Patent Agency Ranking