-
公开(公告)号:US11669597B1
公开(公告)日:2023-06-06
申请号:US17409460
申请日:2021-08-23
Applicant: Hubbert Smith
Inventor: Hubbert Smith
CPC classification number: G06F21/10 , G06F21/6236 , H04L63/101 , H04L63/102
Abstract: The disclosure includes a system and method for multiparty collaboration including creating a first data object associated with first collaboration data, the first collaboration data associated with a first collaborating entity; generating a first object ownership log entry to an object ownership log associated with a collaboration, the first object ownership log entry including first identification information identifying the first data object and a first object owner identifying an owner of the first data object, wherein the first object owner associated with the first data object is the first collaborating entity; generating a first object tracking index entry associated with the first data object; receiving a user request associated with the first data object; and responding to the user request based on one or more of a user whitelist, the object ownership log, and the ownership tracking index.
-
公开(公告)号:US11663356B1
公开(公告)日:2023-05-30
申请号:US17150150
申请日:2021-01-15
Applicant: Fannie Mae
Inventor: Maria Vindhan Vernon Sahayam , Basavaraj R. Hubli , Mustafa S. Kapadia
CPC classification number: G06F21/6236 , G06F21/335 , H04L63/0815 , G06F2221/2139 , G06F2221/2141 , G06F2221/2143
Abstract: According to one aspect of this disclosure, dynamic access provisioning provides a centralized, flexible and consistent mechanism to grant access rights to data in real-time by dynamically evaluating access policies that involve user, data and environmental attributes. The mechanism handles complex authorization policies involving numerous different user types with differing access needs and rights, as well as numerous different data sources with differing access requirements. The mechanism also simplifies data usage by providing a single-context experience in a user session, giving access to data from multiple diverse data sources in one access context. Data could be in different domains or project spaces. Users (or the data access apps they create in the session) are not required to switch access contexts to access all the data they are entitled to. The system is also scalable, in that additional data users and data producers may be easily added to the dynamic access provisioning environment.
-
公开(公告)号:US20180367515A1
公开(公告)日:2018-12-20
申请号:US15628344
申请日:2017-06-20
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Parvez Anandam , Ramnath Prasad , Pradeep Ayyappan Nair , Lihua Yuan , Percy Fitter , Mark Hennessy , Mohammad Qudeisat , Rashid Aga , Deepal Jayasinghe , George Chen , David Maltz , Albert Greenberg , Thomas Keane
CPC classification number: H04L63/0471 , G06F9/453 , G06F16/86 , G06F21/6218 , G06F21/6236 , H04L41/0213 , H04L63/10 , H04L63/105 , H04L63/1408
Abstract: Monitoring of cloud computing environments subject to different data control policies is performed in a manner that ensures compliance with the data control policies. A monitoring service is located in a remote cloud computing environment separate from the cloud computing environments being monitored. The monitoring service does not have access to restricted data in the cloud computing environments, including access control data, such that the monitoring service cannot directly interact with network devices. The monitoring service issues requests for monitoring data to device access services in the cloud computing environments. In response to the requests, the device access services obtain access control data to access the network devices and obtain the requested data, which is returned to the monitoring service.
-
公开(公告)号:US20180324254A1
公开(公告)日:2018-11-08
申请号:US15584348
申请日:2017-05-02
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Simon HELSEN , Nicholas R. IBARLUZEA , Ritchard L. SCHACHER
CPC classification number: H04L63/08 , G06F21/44 , G06F21/6236 , H04L63/0823 , H04L67/10 , H04L67/16 , H04W12/0609
Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: receiving a request for a private credential of a first service of the two or more services from the first service, generating the private credential of the first service based on identity information of the first service, storing the private credential of the first service and the identity information of the first service in a local database, and sending the private credential of the first service to the first service for secure communication from the first service.
-
5.
公开(公告)号:US20180316761A1
公开(公告)日:2018-11-01
申请号:US15830033
申请日:2017-12-04
Applicant: mBLAST, Inc.
Inventor: Daniel D. BRIERE , Paul W. PRITCHARD
CPC classification number: G06Q30/0201 , G06F16/2379 , G06F16/24578 , G06F16/951 , G06F16/9535 , G06F16/958 , G06F16/972 , G06F16/986 , G06F17/243 , G06F21/6236 , G06F2221/2129 , G06Q10/0631 , G06Q10/10 , G06Q30/02 , G06Q30/0204 , H04L63/102 , H04L67/16 , H04L67/306
Abstract: The apparatus comprises at least one database for storing digital information associated with at least a first user and a second user, at least one links module for the first user and for the second user, at least one manipulations module and at least one display device for respectively displaying at least said linked digital information wherein said linked digital information associated with said first user is automatically updated on at least said display device of said second user when that information is manipulated, and wherein said linked digital information associated with said second user is automatically updated on at least said display device of said first user when that information is manipulated.
-
公开(公告)号:US20180293398A1
公开(公告)日:2018-10-11
申请号:US16010039
申请日:2018-06-15
Applicant: Microsoft Technology Licensing, LLC
Inventor: Alin Sirbu , John Lincoln DeMaris , Mary David Pasch , Zachary Shallcross , Alexandru Burst , Steve Rayson , Michael Van Waardhuizen
CPC classification number: G06F21/6218 , G06F12/1483 , G06F16/176 , G06F21/6236 , G06F2221/2141 , H04L63/101 , H04L63/104
Abstract: An item is shared based on an information boundary and access control settings. An application such as a document management application detects a selection of an information boundary to manage a sharing action associated with the item. The information boundary includes rules to define how the item is shared. A selection of an access control list is also detected to manage recipients who have an access to the item. The access control list allows a recipient in the list an ability to search and discover the item. In response to a detection of the sharing action to share the item, the information boundary and the access control list is applied to the item. The item is then shared based on the information boundary and the access control list through a link of the item transmitted to a recipient.
-
公开(公告)号:US20180219866A1
公开(公告)日:2018-08-02
申请号:US15421734
申请日:2017-02-01
Applicant: ServiceNow, Inc.
Inventor: Jeremy Norris , Antony Chan , Siddharth Shah
CPC classification number: H04L63/101 , G06F21/6218 , G06F21/6227 , G06F21/6236 , G06F2221/2141 , H04L63/0876 , H04L63/107
Abstract: The unauthorized access of database nodes by application nodes within an electronic computing and communications system can be prevented using an access table that stores access table records indicating that at least some of the application nodes are authorized to access at least some of the database nodes. The access table records can be generated by identifying connections between application nodes and database nodes within a configuration management database. Responsive to receiving a request to access a database node sent from a first application node, the access table can be queried to determine whether an access table record indicating that the first application node is authorized to access the database node is stored in the access table. If that access table record is not stored in the access table, the request is denied. Otherwise, the request is allowed.
-
公开(公告)号:US09996816B2
公开(公告)日:2018-06-12
申请号:US14492140
申请日:2014-09-22
Applicant: Kairos Social Solutions, Inc.
Inventor: Tailim Song , Dae Yong No , Jin Chul Kim
IPC: G06Q50/12 , G06Q10/08 , G06Q50/00 , A63F13/213 , A63F13/71 , A63F13/323
CPC classification number: G06F21/6245 , A63F13/213 , A63F13/323 , A63F13/71 , G06F3/0481 , G06F3/0482 , G06F3/04842 , G06F3/0485 , G06F21/6236 , G06F2221/2111 , G06K9/00221 , G06Q10/087 , G06Q20/042 , G06Q20/12 , G06Q20/123 , G06Q20/32 , G06Q20/3224 , G06Q30/0267 , G06Q30/0619 , G06Q50/01 , G06Q50/12 , H04L12/1813 , H04L51/32 , H04L65/403 , H04L67/10 , H04W4/02 , H04W4/021 , H04W4/04 , H04W4/08 , H04W4/21
Abstract: A method of selecting, displaying, and purchasing favorite drinks of a user within a location-based virtual social networking context is disclosed. A mobile computing device of a first user is used to perform a digital check-in to a venue that is within a physical proximity of the first user. After the digital check-in, a digital menu that contains a list of drinks available at the venue is accessed. The digital menu is displayed to the first user via a screen of the mobile computing device. In response to selection from the first user, one or more drinks from the digital menu are designated as preferred drinks of the first user. The first user's preference of the one or more drinks is electronically communicated to another electronic device.
-
公开(公告)号:US09959415B1
公开(公告)日:2018-05-01
申请号:US12971760
申请日:2010-12-17
Applicant: Ismael Rodriguez , Ross Wilson , Ricardo Torres , Michael C. Kline , Eric Irwin
Inventor: Ismael Rodriguez , Ross Wilson , Ricardo Torres , Michael C. Kline , Eric Irwin
CPC classification number: G06F21/606 , G06F21/10 , G06F21/41 , G06F21/6236 , H04L63/10 , H04L63/105 , H04L63/126
Abstract: Methods and apparatus for use in presenting information from a plurality of security domains. A first request for first data from a first data source and a second request for second data from a second data source are transmitted by a computing device. The first data source is associated with a first security domain, and the second data source is associated with a second security domain. A bridge computing device forwards the first request and/or the second request based on determining that the requests are authorized. The first data and the second data may be received and combined by the computing device.
-
公开(公告)号:US20180107727A1
公开(公告)日:2018-04-19
申请号:US15820979
申请日:2017-11-22
Applicant: NetApp Inc.
Inventor: Vijay M. Deshmukh , Pranab Patnaik , Uday Madhav Joshi , Kiyoshi James Komatsu
CPC classification number: G06F16/275 , G06F3/062 , G06F21/604 , G06F21/6236 , H04L63/08 , H04L63/10 , H04L63/102 , H04L63/20 , H04L67/1095 , H04L67/1097
Abstract: One or more techniques and/or computing devices are provided for secure data replication. For example, a first storage controller may host first storage within which storage resources (e.g., files, logical unit numbers (LUNs), volumes, etc.) are stored. The first storage controller may establish an access policy with a001 second storage controller to which data is to be replicated from the first storage. The access policy may define an authentication mechanism for the first storage controller to authenticate the second storage controller, an authorization mechanism specifying a type of access that the second storage controller has for a storage resource, and an access control mechanism specifying how the second storage controller's access to data of the storage resource is to be controlled. In this way, data replication requests may be authenticated and authorized so that data may be provided, according to the access control mechanism, in a secure manner.
-
-
-
-
-
-
-
-
-