Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 50418. Отображено 100.
05-01-2012 дата публикации

Method and system for managing execution of virtual applications

Номер: US20120005246A1
Автор: Kenji C. Obata
Принадлежит: Code Systems Corp

A system and method for directing download and execution of an application. A runtime engine receives an identifier of a block of shared memory from a directing process. The shared memory stores a map indicating which portions of an application file have been stored in a local copy of the application file. The runtime engine also receives an instruction from the directing process to execute the local copy when the local copy stores less than the entire application file. As the application executes, the runtime engine identifies requests from the application to access portions of the local copy and uses the map to determine whether the requested portions have been stored in the local copy. If the requested portions are not stored in the local copy, the runtime engine prevents the executing application from accessing the local copy until the map indicates the requested portions have been stored therein.

Подробнее
19-01-2012 дата публикации

Data processing apparatus, data processing method, and computer-readable storage medium storing a program

Номер: US20120016844A1
Автор: Koji Inose
Принадлежит: Canon Inc

A table is provided including a document name and content that is included the document data thereof and for which the number of times that duplication is permitted is restricted, in association with each other. The table is referenced, and a determination is made as to whether document data targeted for duplication processing includes content for which duplication processing is restricted. If a determination is made that such content is included, deletion-completed document data in which the content has been deleted from the document data is generated (S 309 ), and the document name, the deletion-completed document data, and information regarding the content are stored in association with each other (S 313 ).

Подробнее
19-01-2012 дата публикации

Clustering of search results

Номер: US20120016877A1
Принадлежит: Yahoo Inc until 2017

One particular embodiment clusters a plurality of documents using one or more clustering algorithms to obtain one or more first sets of clusters, wherein: each first set of clusters results from clustering the documents using one of the clustering algorithms; and with respect to each first set of clusters, each of the documents belongs to one of the clusters from the first set of clusters; accesses a search query; identifies a search result in response to the search query, wherein the search result comprises two or more of the documents; and clusters the search result to obtain a second set of clusters, wherein each document of the search result belongs to one of the clusters from the second set of clusters.

Подробнее
19-01-2012 дата публикации

Verifying access-control policies with arithmetic quantifier-free form constraints

Номер: US20120017260A1
Автор: Gary Levin, Sanjai Narain
Принадлежит: Telcordia Technologies Inc

A system and method is provided for verifying an access-control policy against a particular constraint for a multi-step operation. In disclosed embodiments, the method includes expressing the access-control policy as a first quantifier-free form (QFF) constraint and identifying the particular constraint as a second QFF constraint. The method also includes identifying an operation vector and providing copies of the operation vector associated with steps in the multi-step operation. The method also includes determining a third QFF constraint using the first QFF constraint, the second QFF constraint, and the copies of the operation vector. The method also includes solving the third QFF constraint to determine a solution and outputting a result of the solving.

Подробнее
16-02-2012 дата публикации

Method of creating graph structure from time-series of attention data

Номер: US20120042230A1
Автор: Joshua Schachter
Принадлежит: Yahoo Inc until 2017

Embodiments of the present invention provide systems, methods and computer program products for generating search results comprising web documents with associated expert information. One embodiment of a method for generating such search results includes receiving one or more search queries, selecting one of the one or more search queries, determining one or more categories of web documents responsive to the selected search query and crawling a web graph of linked web documents to identify one or more web documents tagged as within the one or more categories responsive to the selected search query. The method further includes generating a result set of the one or more web documents identified as within the one or more categories responsive to the selected search query, ranking the result set and generating a list of ranked search results responsive to the selected search.

Подробнее
23-02-2012 дата публикации

Methods and software for analysis of research publications

Номер: US20120047127A1
Принадлежит: Elsevier Inc

In one aspect, the invention comprises a computer system for searching databases and displaying search results, comprising databases storing information regarding publications and authors comprising author, title, date of publication, cited references, and citing references data; and Internet servers in communication with those databases; wherein at least one of those Internet servers is in communication with and operable to transmit data to a Web browser resident on a user's computer, and wherein the data is sufficient to enable the browser to display a citation overview page comprising: (a) a list of one or more titles of publications or names of authors, and (b) one or more displayed numerals representing how many publications in one or more specified categories cite to each of the publications, or, for author names, how many publications in one or more specified categories cite to publications on which those names are listed as authors.

Подробнее
01-03-2012 дата публикации

System And Method For Providing A User-Adjustable Display Of Clusters And Text

Номер: US20120050329A1
Принадлежит: Individual

A system and method for providing a user-adjustable display of clusters and text is provided. A two-dimensional display of cluster spines is provided. The cluster spines each include clusters of documents proximately aligned. A compass is provided within the display and positioned over one or more clusters of at least one cluster spine based on instructions from a user. The display of the clusters positioned within the compass is altered. Spine labels are positioned circumferentially around the compass. Each spine label represents a concept associated with one of the cluster spines positioned within the compass.

Подробнее
01-03-2012 дата публикации

Method for classification of objects in a graph data stream

Номер: US20120054129A1
Автор: Charu Aggarwal
Принадлежит: International Business Machines Corp

A method for classifying objects in a graph data stream, including receiving a training stream of graph data, the training stream including a plurality of objects along with class labels that are associated with each of the objects, first determining discriminating sets of edges in the training stream for the class labels, wherein a discriminating set of edges is one that is indicative of the object that contains these edges having a given class label, receiving an incoming data stream of the graph data, wherein class labels have not yet been assigned to objects in the incoming data stream, second determining, based on the discriminating sets of edges, class labels that are associated with the objects in the incoming data stream; and outputting to an information repository object class label pairs based on the second determining.

Подробнее
15-03-2012 дата публикации

Object sharing and search system

Номер: US20120066230A1
Автор: Chen-Yu Sheu
Принадлежит: Individual

This invention is related to an object sharing and search system (OS3) that allows users to create and share computational content of any sort in a multi-user computing environment. It considers user, domain and document as three basic and interacting classes of objects, and allows users to create domain hierarchies, to create objects within a domain, to specify the accessibility of an object in a domain, etc., and it controls the access of an object by another object in a domain. It also allows users to search objects in a domain and recommend the ranking for a search.

Подробнее
22-03-2012 дата публикации

Document management system and method thereof

Номер: US20120069408A1
Автор: Masami Tsutsumi
Принадлежит: Toshiba Corp, Toshiba TEC Corp

A document management system including a two dimensional code region detection portion that detects a two dimensional code region included in image data, obtained by scanning a document to be managed; a two dimensional code decoding portion that decodes document management information included in the two dimensional code; a layout analysis portion that analyzes a layout of the document; a low resolution portion that obtains data in which a background image becomes low resolution; a two dimensional code character and background processing portion that changes the content of the document; a two dimensional code character encoding portion that encodes the two dimensional code; a background encoding portion that encodes data of the background image; a document filing portion that generates a document file; and a file management portion that adds document management information, decoded by the two dimensional decoding portion, to the document file formed by the document filing portion.

Подробнее
05-04-2012 дата публикации

Method and apparatus to implement secured, event-based layered logout from a computer system

Номер: US20120084837A1
Автор: Girish Dhanakshirur
Принадлежит: International Business Machines Corp

A secure, layered logout of a user session is implemented in a web-based management tool, such as a middleware appliance. A logout strategy is provided to include a set of security levels of varying sensitivity, with each security level having a set of permissions associated therewith and that are enforced upon occurrence of an event. A succeeding security level in the set of security levels is reached upon occurrence of an event associated with that level, in which case the set of permissions associated with the security level are then enforced against at least one managed object while the user session continues. As each next security level is reached, the set of permissions associated with the security level are then enforced (with respect to the managed object or against one or more other managed objects), once again while the user session continues. Each of the objects preferably is managed independently of at least one other object; thus, the layered logout may enforce different permissions with respect to different managed objects while at the time maintaining the user session. If the user takes no action, and as a result of the occurrence of the events, eventually a final security level of the set of security levels will occur, at which point the user session is finally terminated.

Подробнее
12-04-2012 дата публикации

Cross-site scripting prevention in dynamic content

Номер: US20120090026A1
Принадлежит: Microsoft Corp

Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item or scripted items. The scripted item is identified within the content. An identifier is associated with the scripted element when the scripted element is an intended scripted element to be associated with the content. The identifier may be a hash value based from a hash function and the scripted item. Prior to communicating the content to a user, the scripted item is identified again to determine if an identifier is associated with the scripted item. If an identifier is associated with the scripted item, the identifier is evaluated to determine if the identifier is appropriate. When the identifier is determined to not be appropriate, the scripted item is prevented from being communicated to a user.

Подробнее
03-05-2012 дата публикации

System and Method for Storage and Retrieval of Electronic Documents

Номер: US20120110039A1
Принадлежит: INVIZION PTY LTD

The present invention is directed to a system and method of determining where electronic documents are stored. The system and method of the present invention analyses the metadata of a document, and determines status attributes of the document based on the metadata. The document is then stored in an appropriate storage system based on the status attribute of the document. The metadata of the document includes usage patterns.

Подробнее
03-05-2012 дата публикации

Method and apparatus for providing distributed policy management

Номер: US20120110632A1
Принадлежит: Nokia Oyj

An approach is provided for distributed policy management and enforcement. A policy manager determines one or more domains of an information system. The one or more domains are associated at least in part with respective subsets of one or more resources of the information system. The policy manager also determines one or more respective access policies local to the one or more domains. The one or more respective access policies configured to enable a determination at least in part of access to the respective subsets, the one or more resources, or a combination thereof. At least one of the one or more respective access policies is configured to operate independently of other ones of the one or more respective schemas.

Подробнее
24-05-2012 дата публикации

Method and apparatus for controlling access to data based on layer

Номер: US20120131342A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

Disclosed is an access control apparatus and method for giving access authority with respect to data. The access control apparatus may encrypt, using a Public Key (PK) of a terminal, a Node Key (NK) of a target layer in which the access authority is to be granted to the terminal, and produce an Access Control List (ACL) of the target layer based on the encrypted NK and ID information of the terminal. Also, the access control apparatus may produce a copy of the ACL based on the produced ACL, and store the produced copy of the ACL in a lower layer.

Подробнее
31-05-2012 дата публикации

Compliance Rules Analytics Engine

Номер: US20120136806A1

The present invention relates to compliance rules analytics systems and methods for facilitating compliance, such as the compliance of an investment portfolio or a set of investment portfolios, with a rule or a set of rules.

Подробнее
31-05-2012 дата публикации

Skip list generation

Номер: US20120136871A1
Принадлежит: Canon Inc

A method of generating a skip list is disclosed. The skip list comprises a data structure for referencing a plurality of ordered nodes, the data structure having a plurality of linked lists, a total number of the plurality of linked lists being constrained by an available memory of a memory system, the method comprising the steps of: inserting a first node of the plurality of nodes into a predetermined linked list of the plurality of linked lists of the data structure of the skip list in the available memory; promoting the first node to one or more other linked lists based on a first set of criteria; and generating the skip list by inserting at least a second node of the plurality of nodes into the data structure and promoting the second node based on a second set of criteria, said second set of criteria being different from the first set of criteria.

Подробнее
31-05-2012 дата публикации

Security systems and methods to reduce data leaks in enterprise networks

Номер: US20120137375A1
Принадлежит: Georgia Tech Research Corp

Disclosed are embodiments of a security system for reducing data leaks by checking information flows between resources of a network. When an information flow is attempted between a sending resource, which can be anywhere in the network, and a receiving resource residing at a specific host within the network, a host labeler can determine whether information is allowed to flow from the sending resource to the receiving resource. The sending resource and the receiving resource can each have an applicable label, and each label can comprise zero, one, or more taints. For each taint having an active secrecy characteristic in a label of the sending resource, the host labeler can require that there be a matching taint with active secrecy characteristic in the receiving resource. If this condition is not met, the security system can block the information flow between the sending and receiving resources.

Подробнее
14-06-2012 дата публикации

Calculating State of Cryptographic Objects and Generating Search Filter for Querying Cryptographic Objects

Номер: US20120150897A1
Принадлежит: International Business Machines Corp

Mechanisms are provided for calculating state of cryptographic objects and generating search filters for querying cryptographic objects based on the given state or on the given combination of unique states. The mechanism to calculate a state of a cryptographic object allows an application or system to resolve the current state of any cryptographic object with the following set of state altering date values: initial date, activation date, deactivation date, compromise date, and destroy date. A processing module may retrieve the state meta-data and calculate the current state of a given cryptographic object. The current state may be, for example, one of the following: unknown, pre-active, active, deactivated, compromised, destroyed, and destroyed-compromised. The mechanism to generate a search filter may generate a search query language (SQL) search filter to query for cryptographic objects using the state altering date values stored for each object.

Подробнее
21-06-2012 дата публикации

Technique for Supporting Multiple Secure Enclaves

Номер: US20120159184A1
Принадлежит: Intel Corp

A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.

Подробнее
21-06-2012 дата публикации

Business intelligence document

Номер: US20120159465A1
Принадлежит: Microsoft Corp

A business intelligence (BI) document preserves references to identities and formats of remote data sources and allows a local computing device to offload analytical operations to remote data sources. The BI document specifies a graph of entities connected by directed edges from the output of one entity to an input of another entity. An entity, for example, can represent without limitation a data structure, an external data source, a control element, an external event source, a visualization, or an update service. The entities of a BI document at a local computing device can reference data at an original data source—rather than extracting data from the original data source to a preferred local datastore. An entity of the BI document can direct a remote data source to execute transformations on the remote data before returning a solution to the local computing device.

Подробнее
21-06-2012 дата публикации

System and method for data collection and exchange with protected memory devices

Номер: US20120159518A1
Принадлежит: Mo DV Inc

A method, apparatus, and article of manufacture for collecting and exchanging data are disclosed. In one embodiment, the apparatus comprises a non-volatile memory device, which includes an interface for coupling the non-volatile memory device to a host system; non-volatile memory for storing data, including a plurality of executables at least two of which are executable on different operating systems or devices. The plurality of executables includes a data collection executable and a data transfer executable. The non-volatile memory device also includes a controller to cause execution of at least one executable in the plurality of executables, including the data collection executable and the data transfer executable, where execution of the data collection executable causes data to be collected and stored in the non-volatile memory, and execution of which causes the collected data to be transferred to a location external to the non-volatile memory device.

Подробнее
05-07-2012 дата публикации

System And Method For Harvesting Electronically Stored Content By Custodian

Номер: US20120173506A1
Принадлежит: Individual

A system and method for harvesting electronically stored content by custodian is provided. Content associated with user names for one or more custodians is maintained in a collaboration environment. A custodian list with names of at least a portion of the custodians is received. Access reports each having user names and associated unique identifiers for the custodians with access to the content within a collaboration environment are obtained. One or more of the user names are mapped with at least one of the custodians by comparing the list of custodians to the access reports and by determining a selected user name for the at least one custodian. The content associated with the at least one custodian is identified using the selected user name.

Подробнее
12-07-2012 дата публикации

Method, Apparatus and System for Accessing Remote Files

Номер: US20120179731A1
Автор: Chuming Chen, Yan Lin
Принадлежит: Sangfor Networks Co Ltd

The present invention relates to a method, apparatus and system for accessing remote files, wherein the method for accessing remote files comprising the following steps: obtaining download operation information for downloading a file in an operational system server; redirecting the download operation to a file server with safety space; saving a real copy of the downloaded file in the safety space and enumerating a corresponding virtual copy in the safety space. In the present invention, local file operations are redirected to the network file operations of network file storage system by redirecting the download operation on the file in the operational system server to the file server instead of being saved in the local user terminal to realize the “Not to local” effect for the key file. Even when it is power-off and then restarted, the data will not be saved in the local user terminal to achieve an effect close to “physical-like isolation”, which solves the safety problems of the offline key file much better.

Подробнее
26-07-2012 дата публикации

Access control data editing support device and method

Номер: US20120192267A1
Автор: Taisuke Aizawa
Принадлежит: Fujitsu Ltd

A computer-readable, non-transitory medium recording an access control data editing support program for causing a computer to implement a procedure. The procedure includes changing log information containing a record having an authorization result of first access authorization determined based on access control data and a content utilized for determining the first access authorization every time an access agent accesses an access target, and changing the access control data based on the changed log information, and determining second access authorization by applying the changed access control data to the content utilized for determining the first access authorization indicated by the log information and generating determination result information containing an authorization result of the second access authorization and a content utilized for determining the second access authorization.

Подробнее
02-08-2012 дата публикации

System and Method for Enforcing Future Policies in a Compute Environment

Номер: US20120198467A1
Автор: David B. Jackson
Принадлежит: Adaptive Computing Enterprises Inc

A disclosed system receives a request for resources, generates a credential map for each credential associated with the request, the credential map including a first type of resource mapping and a second type of resource mapping. The system generates a resource availability map, generates a first composite intersecting map that intersects the resource availability map with a first type of resource mapping of all the generated credential maps and generates a second composite intersecting map that intersects the resource availability map and a second type of resource mapping of all the generated credential maps. With the first and second composite intersecting maps, the system can allocate resources within the compute environment for the request based on at least one of the first composite intersecting map and the second composite intersecting map.

Подробнее
02-08-2012 дата публикации

Method for Information Editorial Controls

Номер: US20120198522A1
Автор: Chuck Van Court
Принадлежит: Fuze Digital Solutions LLC

A method comprises the steps of submitting at least one comment regarding an editorially-controlled content to be published with the editorially-controlled content. The published comment is authored by a contributing member of an online community. A rating of the published comment is entered. The rating is determined by at least one reviewing member of the online community. Points are assigned within a predefined range for ratings of the published comment that exceeds a predetermined level. The points are assigned to the contributing member by an editor of the online community in which the points identify subject matter expertise for the contributing member. Awarded points are received in which the awarded points received by the contributing member comprise the points capped by a maximum number assigned to the editorially-controlled content.

Подробнее
02-08-2012 дата публикации

Associated with abnormal application-specific activity monitoring in a computing network

Номер: US20120198569A1
Автор: Miroslav Halas
Принадлежит: Bank of America Corp

Embodiments herein disclosed provide for computer network security and, more specifically, monitoring application-based access to secure data and monitoring predetermined actions conducted on applications to determine abnormal access or abnormal actions. Specific embodiments of the invention provide for improved database which implements time period-structured tables and file directories. Such structuring of the database provides for automated data purging, backing-up of data and data recovery. Additional embodiments provide for tracking data attributes related to the monitored data, such as the quality of the monitored data, the quality of the monitored data and the origin of the monitored data. In addition, embodiments provide for validating the source of the monitored data to assure that data is received from a valid application.

Подробнее
23-08-2012 дата публикации

Providing data security through declarative modeling of queries

Номер: US20120216240A1
Принадлежит: Microsoft Corp

Data security is implemented through a query based policy constraining a primary table. Nested tables inherit the security policy by implementing the policy queries of the primary table. Operations on nested tables such as join actions execute the security policy queries once due to inheritance from the primary table therefore optimizing query modeling. A security policy may respond to a context or a role by executing queries responsive to the context.

Подробнее
30-08-2012 дата публикации

Enterprise level data management

Номер: US20120221550A1
Принадлежит: Varonis Systems Inc

A system for identifying data of interest from among a multiplicity of data elements residing on multiple platforms in an enterprise, the system including background data characterization functionality characterizing the data of interest at least by at least one content characteristic thereof and at least one access metric thereof, the at least one access metric being selected from data access permissions and actual data access history and near real time data matching functionality selecting the data of interest by considering only data elements which have the at least one content characteristic thereof and the at least one access metric thereof from among the multiplicity of data elements.

Подробнее
06-09-2012 дата публикации

Transponder, method and reader for monitoring access to application data in the transponder

Номер: US20120223809A1
Автор: Mario Steiner
Принадлежит: NXP BV

A transponder for wirelessly receiving external data and for monitoring access to application data, the transponder including: a data storage storing application data; a data storage control region; and a data storage access controller configured to store, in the data storage control region, data indicative of an access to the application data stored in the data storage, when the application data was accessed based on the external data. Further, a method and a reader for monitoring access to application data stored in a transponder are described.

Подробнее
06-09-2012 дата публикации

Systems, methods, and computer program products for secure multi-enterprise storage

Номер: US20120226722A1
Принадлежит: International Business Machines Corp

In one embodiment, a system includes logic adapted for: receiving data identifiers (IDs), each associated with a file, from multiple data providers, storing the data IDs to a database, identifying any duplicate data IDs in the database to determine if any of the files associated with the data IDs are non-confidential, querying the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file to a storage network, such as a cloud storage network, receiving a response from the data provider indicating whether or not to store the file to the storage network, receiving the file from the data provider, storing the file to a storage network, and causing deletion of the file from a system of the data provider. In other embodiments, computer program products are presented for storing data to a storage network.

Подробнее
06-09-2012 дата публикации

Concepts and link discovery system

Номер: US20120226974A1
Принадлежит: IxReveal Inc

In one embodiment, a method includes receiving a first selection, from a user, indicative of a first concept, the first concept being defined by the presence or absence of a text string in an unstructured data object or a data code stored in a structured data object. The method further includes receiving a second selection, from a user, the second selection indicative of a second concept, the second concept being defined by the presence or absence of a text string in an unstructured data object or a data code stored in a structured data object. The method further includes determining a relationship between the first concept and the second concept, the relationship based on a number of documents from a plurality of documents that include the first concept and the second concept. The method further includes outputting a visual representation of the relationship to a display.

Подробнее
13-09-2012 дата публикации

Auto-updatable document parts within content management systems

Номер: US20120233250A1
Автор: Kwai H. Man, Wai K. So
Принадлежит: International Business Machines Corp

Techniques are described for managing relationships between entities in a content management system. Embodiments of the invention identify a relationship between a first entity and a second entity in the content management system. Embodiments monitor the first entity in the content management system to detect an occurrence of a triggering event specified in one or more management rules. One or more actions specified by the one or more management rules are then performed on the second entity in the content management system, responsive to the detected occurrence of the triggering event.

Подробнее
20-09-2012 дата публикации

Storage system, storage control apparatus, and storage control method

Номер: US20120239943A1
Автор: Hiroshi Okamoto
Принадлежит: Fujitsu Ltd

In a storage system, a storage apparatus has an encryption key generator and an encryption processor that encrypts data to be recorded in a storage region using an encryption key from the encryption key generator, and is able to change an encryption key for each divided region set in the storage region. A control apparatus has a logical volume setting unit that requests the encryption processor to set an individual divided region for each storage region set as a logical volume in the storage region of the storage apparatus and a data erasure processor that requests the encryption processor to change the encryption key used for encryption in the divided region corresponding to the logical volume to be erased.

Подробнее
27-09-2012 дата публикации

System and method for secured backup of data

Номер: US20120246472A1
Принадлежит: Safend Ltd

A system and method of selectively providing encrypted data is provided. Embodiments of the invention may store data in encrypted form on a storage device. Embodiments of the invention may selectively provide encrypted or decrypted data to a requestor of data based on configuration or other parameters. A filter driver or other module or unit may examine a request for, or communication of data from the storage device and may determine if data is to be provided in encrypted or decrypted form. Decrypted data may be provided to a caching system. A filter driver or other module or unit may examine a request for, or communication of data from the caching system. Data provided from the caching system may be selectively encrypted based on configuration or other parameters.

Подробнее
04-10-2012 дата публикации

Providing particular level of access to one or more items in response to determining primary control of a computing device

Номер: US20120254986A1
Принадлежит: ELWHA LLC

A computationally implemented system and method that is designed to, but is not limited to: determining which of a plurality of users detected in proximate vicinity of a computing device has primary control of the computing device; and providing a particular level of access, via the computing device, to one or more items, the particular level of access to be provided to the one or more items being in response, at least in part, to said determining. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.

Подробнее
11-10-2012 дата публикации

Multiple independent encryption domains

Номер: US20120257743A1
Автор: Peter H. Van Der Veen
Принадлежит: QNX Software Systems Ltd

A stored object may be encrypted with an “object” cryptographic key. The object cryptographic key may be stored in metadata for the object and the metadata for the object may be encrypted using an “internal” cryptographic key associated with a particular encryption domain. The internal cryptographic key may be stored in a filesystem memory block associated with the particular encryption domain. A “domain” cryptographic key may be generated and stored associated with the particular encryption domain. The domain cryptographic key may be used to encrypt the filesystem memory block. Conveniently, below the domain cryptographic key, the filesystem has a unique, totally unknown, internal cryptographic key for actual data encryption.

Подробнее
18-10-2012 дата публикации

System and method for indexing electronic discovery data

Номер: US20120265762A1
Принадлежит: PLANET DATA SOLUTIONS

Systems and methods for efficiently processing electronically stored information (ESI) are described. The systems and methods describe processing ESI in preparation for, or association with, litigation. The invention preserves the contextual relationships among documents when processing and indexing data, allowing for increased precision and recall during data analytics.

Подробнее
18-10-2012 дата публикации

Differential Encryption Utilizing Trust Modes

Номер: US20120266218A1
Автор: Ulf Mattsson
Принадлежит: Protegrity Corp

Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based on network connectivity, attended/unattended status, or a combination thereof. Additional embodiments of the invention incorporate “trust windows” that provide granular and flexible data access as function of the parameters under which sensitive data is accessed. Further embodiments refine the trust windows concept by incorporating dynamic intrusion detection techniques.

Подробнее
25-10-2012 дата публикации

System and Method of Accessing a Document Efficiently Through Multi-Tier Web Caching

Номер: US20120271852A1

Upon receipt of a document request, a client assistant examines its cache for the document. If not successful, a server searches for the requested document in its cache. If the server copy is still not fresh or not found, the server seeks the document from its host. If the host cannot provide the copy, the server seeks it from a document repository. Certain documents are identified from the document repository as being fresh or stable. Information about each of these identified documents is transmitted to the server which inserts entries into an index if the index does not already contain an entry for the document. If and when this particular document is requested, the document will not be present in the server, however the server will contain an entry directing the server to obtain the document from the document repository rather than the document's web host.

Подробнее
08-11-2012 дата публикации

Method and device to detect similar documents

Номер: US20120284270A1
Принадлежит: NHN Corp

A method for detecting similar documents includes extracting an entity from each of a first web document and a second web document; determining an importance contribution element corresponding to each of the web documents; calculating, using the processor, weights for each entity based on the determined importance contribution elements; and determining whether the web documents are similar documents based on the calculated weights. A device to detect similar documents includes a storage device; an entity extractor stored on the storage device and configured to extract an entity from a first web document and a second web document and to determine an importance contribution element from each of the web documents; a weight calculator configured to calculate weights of each entity based on the determined importance contribution elements; and a similar document detection unit configured to determine whether the web documents are similar documents based on the calculated weights.

Подробнее
08-11-2012 дата публикации

Systems and methods for electronic document identification and certification

Номер: US20120284602A1
Принадлежит: VSIG COM Inc

Systems and methods for electronic document electronic document identification and signing are provided. Certain embodiments of the present invention provide for a virtual signature tool to create a unique, verifiable, electronic signature (SigCode) for signing documents using a mobile device of an individual. In some embodiments, document identifiers (e.g., QR codes) can be used to identify and retrieve documents for digital signing. For example, upon scanning other document identifier, an electronic version of the document (e.g., a waiver) can be retrieved from a server. The electronic document can be displayed on the user's mobile device (e.g., through a webpage). Then, the user can review the electronic document, fill in any required information, and sign the document with an electronic signature generated by the electronic signature tool.

Подробнее
15-11-2012 дата публикации

Data management

Номер: US20120290850A1
Принадлежит: Hewlett Packard Development Co LP

In one implementation, encrypted data and a virtual machine are stored together as a virtual machine-data image, wherein the virtual machine is configured to EXERT management control over the data based on policies set by an owner of the data. In another implementation, metadata defining or tagging policies for usage of data is associated with the data. Control capabilities of service providers are mapped to the policies, wherein those service provider environments that best satisfy the controls mapped to the policies are identified.

Подробнее
15-11-2012 дата публикации

Security compliant data storage management

Номер: US20120291133A1
Принадлежит: International Business Machines Corp

An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.

Подробнее
22-11-2012 дата публикации

Recovering transactions of failed nodes in a clustered file system

Номер: US20120297247A1
Принадлежит: International Business Machines Corp

Systems. Methods, and Computer Program Products are provided for recovering transactions of failed nodes using a recovery procedure in a clustered file system (CFS). A data segment is determined that the data segment should be copied to a final storage location by validating that an ownership of the data segment is not associated with any other operational node, via a distributed shared memory (DSM) agent. The ownership of the data segment is set to a local DSM agent.

Подробнее
29-11-2012 дата публикации

Concurrent transactional checkpoints in a clustered file system

Номер: US20120303683A1
Принадлежит: International Business Machines Corp

Systems, Methods, and Computer Program Products are provided for performing concurrent checkpoints from file system agents residing on different nodes within in a clustered file system (CFS). Responsibility to checkpoint a modified and a committed data segment to a final storage location is assigned to one of the file system agents. One of the file system agents, which is assigned, is the file system agent whose associated distributed shared memory (DSM) agent is an owner of the data segment.

Подробнее
29-11-2012 дата публикации

Electronic messaging system with configurable delivery that maintains recipient privacy

Номер: US20120303734A1
Принадлежит: WHORLR LLC

A messaging service allows message senders to reach a web site owner in the way the owner wants. Users authorized by the owner drop a message into the message service of a site owner, and it gets delivered to the site owner in exactly the manner specified by the site owner. The site owner can organize incoming messages by time, calendar, user, or viewing method. The site owner can receive messages in the way she wants, but all her friends need to know is one address, the owner's site address.

Подробнее
06-12-2012 дата публикации

Distributed architecture for paperwork imaging

Номер: US20120310979A1
Принадлежит: DEUTSCHE POST AG

The present invention provides a method and system for storage of data files, comprising notifying at least one local reference storage about storing and/or deleting a data file on a central data repository, depositing a reference element on the at least one local reference storage after notifying, requesting a deposited reference element from the local reference storage for demanding a data file contained in the central data repository, retrieving the demanded data file on submitting the reference element to the central data repository.

Подробнее
06-12-2012 дата публикации

Privacy-preserving matching service

Номер: US20120311035A1
Принадлежит: Microsoft Corp

Described herein are technologies pertaining to protecting user privacy in connection with attribute-based matching services. A user registers with a platform that includes a plurality of non-collaborating partitions, where registration includes transmitting a message to the platform that indicates that the user has one or more attributes corresponding thereto. Through selective encryption and a communications protocol amongst the partitions, none of the partitions are able to ascertain that the user has the attributes. Acting in conjunction, however, the plurality of partitions perform rich attribute

Подробнее
06-12-2012 дата публикации

Method and system for automatic generation of cache directives for security policy

Номер: US20120311674A1
Принадлежит: International Business Machines Corp

An authorization method is implemented in an authorization engine external to an authorization server. The authorization server includes a cache. The external authorization engine comprises an authorization decision engine, and a policy analytics engine. The method begins when the authorization decision engine receives a request for an authorization decision. The request is generated (at the authorization server) following receipt of a client request for which an authorization decision is not then available at the server. The authorization decision engine determines an authorization policy to apply to the client request, applies the policy, and generates an authorization decision. The authorization decision is then provided to the policy analytics engine, which stores previously-generated potential cache directives that may be applied to the authorization decision. Preferably, the cache directives are generated in an off-line manner (e.g., during initialization) by examining each security policy and extracting one or more cache dimensions associated with each such policy. The policy analytics engine determines an applicable cache directive, and the decision is augmented to include that cache directive. The decision (including the cache directive) is then returned to the authorization server, where the decision is applied to process the client request. The cache directive is then cached for re-use at the authorization server.

Подробнее
13-12-2012 дата публикации

System and method for near and exact de-duplication of documents

Номер: US20120317126A1
Принадлежит: MSC Intellectual Properties BV

A system, method and computer program product for identifying near and exact-duplicate documents in a document collection, including for each document in the collection, reading textual content from the document; filtering the textual content based on user settings; determining N most frequent words from the filtered textual content of the document; performing a quorum search of the N most frequent words in the document with a threshold M; and sorting results from the quorum search based on relevancy. Based on the values of N and M near and exact-duplicate documents are identified in the document collection.

Подробнее
20-12-2012 дата публикации

Systems and methods for determining exclusion efficiencies of a plurality of keywords appearing in a search result

Номер: US20120323892A1
Принадлежит: International Business Machines Corp

Determining exclusion efficiencies of a plurality of keywords appearing in a search result of an exclusion keyword for indicating efficient exclusion of an unwanted piece of data when the user narrows searching objects. The determining of exclusion efficiencies may involve a processor to calculate an exclusion efficiency for each of a plurality of keywords, if a search condition is applied to the search result and the keyword is applied as an exclusion keyword to the search result. The exclusion efficiency of each of the plurality of keywords provides an indication regarding the effectiveness of exclusion of the keyword.

Подробнее
20-12-2012 дата публикации

Information processing apparatus, terminal apparatus and information processing method

Номер: US20120324544A1
Автор: Dai Kanetomo
Принадлежит: NEC Corp

This invention is directed to achievement of a content sharing with a high level of safety by restricting the other end of communication with which contents are shared. An information processing apparatus, which can communicate with first and second terminal apparatuses, manages an access right required for the user of the first terminal apparatus to access contents on a network. The information processing apparatus determines whether a communication, in which the other party of communication is specified, is performed between the first and second terminal apparatuses. In the case of being determined that the first and second terminal apparatuses is performing the communication with each other, the information processing apparatus utilizes the access right to permit an access from the second terminal apparatus to the contents.

Подробнее
27-12-2012 дата публикации

Image-based retrieval for high quality visual or acoustic rendering

Номер: US20120328215A1
Принадлежит: Intel Corp

The embodiments of the invention relate to method for image-based retrieval of an image or text, comprising capturing a digital image; matching the digital image against digitally-stored documents; and retrieving one or more of the digitally-stored documents that match the digital image. Other embodiments relate to a device for image-based retrieval and rendering, comprising an image capturing device for capturing digital image; a device for processing the digital image to match it against digitally-stored documents; a device for retrieving a digitally-stored document that matches the digital image; and a device for rendering the selected retrieved image.

Подробнее
27-12-2012 дата публикации

Authentication system, authentication method, and storage medium for realizing a multitenant service

Номер: US20120331539A1
Автор: Hayato Matsugashita
Принадлежит: Canon Inc

In order to prevent leakage of data possessed by a tenant to other tenants in multitenant service, it is necessary to control access. However, the conventional access control method is designed and developed to meet a specified request. Thus, costs for a dedicated design, development, administration, and maintenance need to be considered. Such costs can be reduced by using role information for each of a plurality of services and determining whether to allow or not allow access in a uniform manner.

Подробнее
03-01-2013 дата публикации

Document management system, evaluation device, data output control device, document management method and document management program

Номер: US20130004078A1
Принадлежит: Toshiba Corp, Toshiba Solutions Corp

According to one embodiment, a document management system in the embodiments, includes an information acquisition unit that acquires a management ID, acquires, using the management ID, document type information, and outputs the document type information. The document management system in the embodiments of the invention, includes a policy selection evaluation unit that acquires operation information, user information, and the document type information, selects policy information defining an operation extent of user based on the document type information, and evaluates whether or not that a user defined in the user information is authorized to perform an operation defined in the operation information in accordance with a definition of the selected policy information.

Подробнее
03-01-2013 дата публикации

Protocol for Controlling Access to Encryption Keys

Номер: US20130007464A1
Автор: David H. MADDEN
Принадлежит: Individual

A secure remote-data-storage system stores encrypted data and both plaintext and encrypted keys at a server, where data at the server is inadequate to recover the plaintext of the encrypted data; and stores at least one encrypted key at a client system. To decrypt the data, the client must obtain a copy of the encrypted data from the server, and a key to decrypt its locally-stored encrypted key. Once decrypted, the locally-stored key can be used to decrypt the encrypted data, or to decrypt an encrypted key from the server, which may then be used decrypt the encrypted data.

Подробнее
31-01-2013 дата публикации

System and method for locating bilingual web sites

Номер: US20130030788A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for bootstrapping a language translation system. A system configured to practice the method performs a bidirectional web crawl to identify a bilingual website. The system analyzes data on the bilingual website to make a classification decision about whether the root of the bilingual website is an entry point for the bilingual website. The bilingual site can contain pairs of parallel pages. Each pair can include a first website in a first language and a second website in a second language, and a first portion of the first web page corresponds to a second portion of the second web page. Then the system analyzes the first and second web pages to identify corresponding information pairs in the first and second languages, and extracts the corresponding information pairs from the first and second web pages for use in a language translation model.

Подробнее
31-01-2013 дата публикации

Secure data storage

Номер: US20130031372A1
Принадлежит: iPhase3 Corp

Methods and systems for obscuring the location of critical system files are provided. In particular, the locations of files stored within a file system are selected by applying various inputs to a hash algorithm. For system files, the inputs applied to the hash algorithm can include a user name and password. For data files, the information provided to the hash algorithm can include the file name. In addition to providing random file locations, a file system in accordance with embodiments of the present invention can homogenize other information, including file names, sizes and creation dates.

Подробнее
31-01-2013 дата публикации

Dynamic reduction of stream backpressure

Номер: US20130031556A1
Принадлежит: International Business Machines Corp

Techniques are described for eliminating backpressure in a distributed system by changing the rate data flows through a processing element. Backpressure occurs when data throughput in a processing element begins to decrease, for example, if new processing elements are added to the operating chart or if the distributed system is required to process more data. Indicators of backpressure (current or future) may be monitored. Once current backpressure or potential backpressure is identified, the operator graph or data rates may be altered to alleviate the backpressure. For example, a processing element may reduce the data rates it sends to processing elements that are downstream in the operator graph, or processing elements and/or data paths may be eliminated. In one embodiment, processing elements and associate data paths may be prioritized so that more important execution paths are maintained. In another embodiment, if a request to add one or more processing elements may cause future backpressure, the request may be refused.

Подробнее
07-02-2013 дата публикации

Document registry system

Номер: US20130036127A1
Принадлежит: Individual

A document registry system ( 10 ) includes a registry database ( 20 ) with a specific task sub-database ( 22 ) and an analytics-supporting general task sub-database ( 24 ). The sub-databases ( 22, 24 ) include i) pre-existing fields configured to store, respectively, specific task-related and analytics-related document data received from one or more of a plurality of sources (S 1, S 2, S 3, S 4 ) or from a source (NS 1, NS 2 ) other than the plurality of sources (S 1, S 2, S 3, S 4 ), and ii) de novo fields configured tote generated as a result of, respectively a specific task query and a general task query and configured to store, respectively, specific task related and general task-related document data received from source(s) (NS 1, NS 2 ) other than the plurality of sources (S 1, S 2, S 3, S 4 ). A query mapping engine ( 26 ) is configured to receive a request entry, map the request entry into a query, and actively collect data based upon the query. Data is collected from the specific task sub-database ( 22 ) or the analytics-supporting general task sub-database ( 24 ), and from the source(s) (NS 1, NS 2 ) other than the plurality of sources (S 1, S 2, S 3, S 4 ).

Подробнее
07-02-2013 дата публикации

Sandboxing technology for webruntime system

Номер: US20130036448A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

In a first embodiment of the present invention, a method of providing security enforcements of widgets in a computer system having a processor and a memory is provided, comprising: extracting access control information from a widget process requesting a service, generating access control rules customized for the widget process, and providing the access control rules to a trusted portion of the computer system outside of the user code space of a Web Runtime (WRT) system; and for any static access control rule, delegating security checking of the widget process from the WRT system to the trusted portion of the computer system.

Подробнее
14-02-2013 дата публикации

Identifying application reputation based on resource accesses

Номер: US20130042294A1
Принадлежит: Microsoft Corp

Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers. These techniques thereby achieve rapid detection and mitigation of newly identified malware through application telemetry in a predominantly automated manner.

Подробнее
21-02-2013 дата публикации

Method and system for unified searching and incremental searching across and within multiple documents

Номер: US20130046745A1
Принадлежит: Veveo LLC

A user-interface system and method for searching among multiple documents and searching for subsections within individual documents using a single search interface on an input-constrained user device having a screen and a keypad.

Подробнее
21-02-2013 дата публикации

Optimization engine in a multi-tenant database system

Номер: US20130046752A1
Принадлежит: Salesforce com Inc

More efficient querying of a multi-tenant database using dynamic tuning of database indices. A layer of meta-data associates data items with tenants, e.g., via tags, and the meta-data is used to optimize searches by channeling processing resources during a query to only those pieces of data bearing the relevant tenant's unique tag.

Подробнее
21-02-2013 дата публикации

Measuring the goodness of a top-k diversified ranking list

Номер: US20130046769A1
Принадлежит: International Business Machines Corp

A method, system and computer program product for measuring a relevance and diversity of a ranking list to a given query. The ranking list is comprised of a set of data items responsive to the query. In one embodiment, the method comprises calculating a measured relevance of the set of data items to the query using a defined relevance measuring procedure, and determining a measured diversity value for the ranking list using a defined diversity measuring procedure. The measured relevance and the measured diversity value are combined to obtain a measure of the combined relevance and diversity of the ranking list. The measured relevance of the set of data items may be based on the individual relevance of each of the data items to the query, and the diversity value may be based on the similarities of the data items to each other.

Подробнее
21-02-2013 дата публикации

Building data security in a networked computing environment

Номер: US20130047230A1
Принадлежит: International Business Machines Corp

In general, embodiments of the present invention provide an approach for providing a multi-tenant/customer partition group separator and securer in a shared cloud infrastructure (e.g., as an extension to DB2®, Label-Based Access Control (LBAC), and/or an independent tool). Among other things, embodiments of the present invention provide cloud administrators with an easy to use customizable, configurable security constraint builder/tool with a built-in multi-tenant/customer enabled security model. Moreover, embodiments of the present invention enable cloud administrators to set up, configure, and manage tenants/customers and their private shards with their own security constraints. The output of this tool greatly eases the time to create an invisible (e.g., software) wall of separation for multiple tenants/customers in a shared cloud infrastructure.

Подробнее
28-02-2013 дата публикации

Encrypted chunk-based rapid data encryption policy compliance

Номер: US20130054977A1
Принадлежит: Microsoft Corp

To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, an encrypted chunks map is accessed. The encrypted chunks map identifies whether, for each chunk of sectors of a storage volume, the sectors in the chunk are unencrypted. In response to a request to write content to a sector, the encrypted chunks map is checked to determine whether a chunk that includes the sector is unencrypted. If the chunk that includes the sector is unencrypted, then the sectors in the chunk are encrypted, and the content is encrypted and written to the sector. If the chunk that includes the sector is encrypted or not in use, then the content is encrypted and written to the sector.

Подробнее
28-02-2013 дата публикации

Sector map-based rapid data encryption policy compliance

Номер: US20130054979A1
Принадлежит: Microsoft Corp

To comply with a policy for a computing device indicating that data written by the computing device to the storage volume after activation of the policy be encrypted, a sector map is accessed. The sector map identifies one or more sectors of a storage volume and also identifies, for each of the one or more sectors of the storage volume, a signature of the content of the sector. In response to a request to read the content of a sector, the content of the sector is returned without decrypting the content if the sector is one of the one or more sectors and the signature of the content of the sector matches the signature of the sector identified in the sector map. Otherwise, the content of the sector is decrypted and the decrypted content is returned.

Подробнее
14-03-2013 дата публикации

Browser-based Discovery and Application Switching

Номер: US20130067358A1
Принадлежит: Microsoft Corp

Various embodiments enable a web browser to promote the availability of an installable application that is associated with a website to which the web browser has been navigated. The web browser is configured to discover the availability of these applications and, responsively, provide a user experience through which the user can acquire and install such applications, as well as switch to applications that have previously been installed. Thus, through the various embodiments, a user is relieved of the burden of having to navigate to a particular application store and periodically search for applications associated with sites to which they browse.

Подробнее
14-03-2013 дата публикации

Resource Access Authorization

Номер: US20130067568A1
Принадлежит: Individual

Techniques for resource access authorization are described. In one or more implementations, an application identifier is used to control access to user resources by an application. A determination is made whether to allow the application to access the user resources by comparing an application identifier received from an authorization service with a system application identifier for the application obtained from a computing device on which the application is executing.

Подробнее
28-03-2013 дата публикации

Semantic questioning mechanism to enable analysis of information architectures

Номер: US20130080461A1
Принадлежит: International Business Machines Corp

Methods, computer program products and systems are directed to receiving a query regarding an information architecture, selecting a set of nodes based on the query, from a plurality of nodes in a weighted linked graph, the weighted linked graph comprising the plurality of nodes and a plurality of pathways, each of the plurality of nodes comprising a source of information regarding the information architecture, each of the plurality of pathways connecting one of the plurality of nodes to another of the plurality of nodes, each of the plurality of pathways comprising a weight, determining a path from the plurality of pathways that passes through all of selected nodes, and presenting the path in response to the query.

Подробнее
28-03-2013 дата публикации

INTERACTIVE ELECTRONIC READER WITH PARENTAL CONTROL

Номер: US20130080471A1
Принадлежит:

An e-reader with a password protected supervisory account that controls various features and functions of the e-reader, and e-reader user profile accounts for reading users of the e-reader. The supervisory account permits the supervisor user to set up one or more e-reader user profiles that are each assigned its own customizable bookshelf for displaying the available electronic published content, such as, e-books. The electronic published content is assigned to each e-reader user profile through the supervisory account. The e-reader provides interactive content that reinforces development of reading skills and reading comprehension. The e-reader provides reading-level specific definitions and an audible pronunciation of the words. The e-reader has zooming and scrolling capabilities. The e-reader may also present suggestions and recommendations for further reading based on the aggregation of reading statistics for all readers by user profile. The e-reader tracks e-reader user information and presents the information to the password protected supervisory account. Multiple instances of the e-reader may exist and be associated with the supervisory account and e-reader user profiles. 1. An e-reader comprising;a memory for storing electronic published content and information relating to an e-reader account;a display for rendering the electronic published content into a visual form;a user input device; and verifying administrative access by a supervisor user associated with the e-reader account;', 'displaying a representation of electronic published content and a prompt for assigning the electronic published content to one or more e-reader user profiles;', 'associating the electronic published content with an e-reader user profile;', 'displaying a representation of the electronic published content to the e-reader user profile only while the electronic published content is associated with the e-reader user profile; and', 'enabling access by a user of the e-reader profile to ...

Подробнее
28-03-2013 дата публикации

Computer network storage environment with file tracking

Номер: US20130080515A1
Автор: Gary Stephen Shuster
Принадлежит: HOSHIKO LLC

A network server may discourage inappropriate use. Files may be altered in such a way as to not noticeably affect acceptable, desired file types, but to substantially corrupt undesirable file types. Every file copied to or from a memory of a server may be affected, or the method may be applied only to selected files or types of files. In particular, files that may be corrupted by alternation include executable software files and compressed files, which may be fault intolerant. Fault tolerant files, which may include text and graphics files, may not be noticeably affected. In some cases, copyrighted files, media files, and/or other files are altered to prevent undesirable distribution.

Подробнее
28-03-2013 дата публикации

File protecting method and a system therefor

Номер: US20130080773A1
Автор: Huazhang Yu, Zhuo Lu
Принадлежит: Feitian Technologies Co Ltd

The invention discloses a file protecting method and a system therefor, relating to the information security field. The method includes: an application receives an instruction for opening a protected file sent by a user and invokes an upper interface of an operation system, and the upper interface sends an instruction for opening the protected file sent by a file system, and a filter driver intercepts the instruction for opening the protected file sent by the upper-layer interface to the file system, if the filter driver determines that the application is valid, it creates an image file on a virtual disk for the protected file, and returns a handler of the image file and reads or writes the protected file by the handler, which avoids a possible disclosure of plain text of the protected file in a buffer in prior art.

Подробнее
28-03-2013 дата публикации

Dynamic reduction of stream backpressure

Номер: US20130081042A1
Принадлежит: International Business Machines Corp

Techniques are described for eliminating backpressure in a distributed system by changing the rate data flows through a processing element. Backpressure occurs when data throughput in a processing element begins to decrease, for example, if new processing elements are added to the operating chart or if the distributed system is required to process more data. Indicators of backpressure (current or future) may be monitored. Once current backpressure or potential backpressure is identified, the operator graph or data rates may be altered to alleviate the backpressure. For example, a processing element may reduce the data rates it sends to processing elements that are downstream in the operator graph, or processing elements and/or data paths may be eliminated. In one embodiment, processing elements and associate data paths may be prioritized so that more important execution paths are maintained.

Подробнее
28-03-2013 дата публикации

Trusted internet identity

Номер: US20130081116A1
Принадлежит: Microsoft Corp

A token or other storage device uses Internet identities to set file access attribute rights. Subsequently, requests to access a file can be controlled by confirming the Internet identity of the requestor by either validating the request with a known public key or retrieving the public key from an Internet identity provider. Files may be stored encrypted and may be re-encrypted with the public key associated with Internet identity making the request.

Подробнее
04-04-2013 дата публикации

Updating a perfect hash data structure, such as a multi-dimensional perfect hash data structure, used for high-speed string matching

Номер: US20130086004A1
Автор: H. Jonathan Chao, Yang Xu
Принадлежит: Polytechnic Institute of NYU

A representation of a new rule, defined as a set of a new transition(s), is inserted into a perfect hash table which includes previously placed transitions to generate an updated perfect hash table. This may be done by, for each new transition: (a) hashing the new transition; and (b) if there is no conflict, inserting the hashed new transition into the table. If, however, the hashed new transition conflicts with any of the previously placed transitions, either (A) any transitions of the state associated with the conflicting transition are removed from the table , the hashed new transition is placed into the table, and the removed transitions are re-placed into the table, or (B) any previously placed transitions of the state associated with the new transition are removed, and the transitions of the state associated with the new transition are re-placed into the table.

Подробнее
11-04-2013 дата публикации

Method and Apparatus for Checking a Structure Conformity for a Piece Of Development Documentation with at Least One Development Document

Номер: US20130091423A1
Принадлежит: SIEMENS AG

A method and an apparatus for checking a structure conformity for a piece of development documentation with at least one development document are disclosed. The method may include the following steps: the at least one development document from the development documentation is read in and a document structure for the development document that has been read in is captured by a capture unit, and discrepancies in the captured document structure from a predetermined document structure are ascertained by a checking unit by using prescribed criteria for checking the structure conformity of the development documentation.

Подробнее
18-04-2013 дата публикации

METHOD AND SYSTEM FOR AUTOMATED SECURITY ACCESS POLICY FOR A DOCUMENT MANAGEMENT SYSTEM

Номер: US20130097667A1
Принадлежит: TITUS INC.

A method and system for providing an automated security access policy in a document management system are described. The security policies are applied based on metadata rules. Once a document is added to the document managements system, the metadata rules are evaluated using the metadata of the document. Based on the results of the evaluation security access policies are applied to the document. 1. A system for automatically creating a security access policy to an electronic document in a document management system , the system comprising:a processor; and associate metadata with the document, the metadata comprising one or more attributes of the document;', 'configure security access policies to be applied to documents in the document management system, comprising specifying one or more metadata rules governing application of security access policies to the documents, and specifying a dynamic metadata, which is dynamically retrieved based on external content analysis of the document performed outside the document management system, comprising the metadata not inferred from contents of the document; and', 'determine the security access policy to be applied to the document to be added to the document management system based on said one or more metadata rules and the metadata associated with the document., 'a non-transitory computer readable storage medium, having computer readable instructions stored thereon for execution by the processor, causing the processor to2. The system of claim 1 , wherein the computer readable instructions further cause the processor to:create said one or more metadata rules;store said one or more metadata rules in a permissions setting configuration file; andcommunicate the permissions setting configuration file to the document management system.3. The system of claim 2 , wherein the computer readable instructions further cause the processor to configure a permission configuration web page for said one or more metadata rules.4. The system of ...

Подробнее
18-04-2013 дата публикации

Method, apparatus, and computer program product for determining media item privacy settings

Номер: US20130097716A1
Принадлежит: Core Wiresless Licensing SARL

An apparatus for determining media item privacy settings may include a processor. The processor may be configured to receive media item capture data associated with a media item. The media item capture data may include at least a capture location. The processor may also be configured to identify a privacy context that corresponds to the media item capture data. In this regard, the capture location of the media item capture data may be within a geographic zone of the privacy context. The processor may be further configured to determine a privacy setting for the media item based on the corresponding privacy context, and, in some embodiments,control access to the media item in accordance with the determined privacy setting. Associated methods and computer program products may also be provided.

Подробнее
25-04-2013 дата публикации

System and method for intelligence based security

Номер: US20130104192A1
Принадлежит: Credant Technologies Inc

Included in the present disclosure are a system, method and program of instructions operable to protect vital information by combining information about a user and what they are allowed to see with information about essential files that need to be protected on an information handling system. Using intelligent security rules, essential information may be encrypted without encrypting the entire operating system or application files. According to aspects of the present disclosure, shared data, user data, temporary files, paging files, the password hash that is stored in the registry, and data stored on removable media may be protected.

Подробнее
09-05-2013 дата публикации

Secure desktop applications for an open computing platform

Номер: US20130117561A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Example secure desktop applications for an open computing platform are disclosed. An example secure desktop method for a computing platform disclosed herein comprises establishing a secure communication connection between a secure desktop provided by the computing platform and a trusted entity, the secure communication connection being accessible to a trusted application authenticated with the secure desktop, the secure communication connection being inaccessible to an untrusted application not authenticated with the secure desktop, and securing data that is stored by the secure desktop in local storage associated with the computing platform, the stored data being accessible to the trusted application and inaccessible to the untrusted application.

Подробнее
09-05-2013 дата публикации

Browser-based secure desktop applications for open computing platforms

Номер: US20130117804A1
Принадлежит: AT&T INTELLECTUAL PROPERTY I LP

Example browser-based secure desktop applications for open computing platforms are disclosed. An example method disclosed herein to provide secure desktop functionality to a computing platform comprises providing, in response to a first request, a secure desktop application to the computing platform, the secure desktop application for execution by a browser on the computing platform, and establishing a secure communication connection between a service node and the secure desktop application, the secure communication connection to provide the secure desktop application with access to a trusted entity, the secure communication connection being accessible to a trusted application downloaded to the computing platform for execution by the browser in association with the secure desktop application, the secure communication connection being inaccessible to an untrusted application not executed in association with the secure desktop application.

Подробнее
09-05-2013 дата публикации

SYSTEM AND METHOD FOR ENFORCING SECURITY POLICIES IN A VIRTUAL ENVIRONMENT

Номер: US20130117823A1
Автор: Dang Amit, Mohinder Preet
Принадлежит: MCAFEE, INC.

A method in one example implementation includes intercepting a request associated with an execution of an object (e.g., a kernel module or a binary) in a computer configured to operate in a virtual machine environment. The request is associated with a privileged domain of the computer that operates logically below one or more operating systems. The method also includes verifying an authorization of the object by computing a checksum for the object and comparing the checksum to a plurality of stored checksums in a memory element. The execution of the object is denied if it is not authorized. In other embodiments, the method can include evaluating a plurality of entries within the memory element of the computer, wherein the entries include authorized binaries and kernel modules. In other embodiments, the method can include intercepting an attempt from a remote computer to execute code from a previously authorized binary. 1. A method , comprising:intercepting, by the security layer, a request for an execution of an object in a computer wherein the request for the execution is from a user space of a privileged domain;verifying an authorization of the object by linking a particular module into a kernel space associated with the privileged domain, wherein the particular module is configured to compute a checksum for the object, access an inventory of a plurality of stored checksums in a memory element, and compare the checksum to the plurality of stored checksums; anddenying the execution of the object if it is not authorized.2. The method of claim 1 , further comprising:evaluating a plurality of entries within the memory element of the computer, wherein the entries include authorized binaries and kernel modules.3. The method of claim 1 , further comprising:intercepting an attempt from a remote computer to execute code from a previously authorized binary; andevaluating an origination address of a hypercall associated with the code before executing the code.4. The method ...

Подробнее
09-05-2013 дата публикации

Method for Processing Data in One or More Control Devices of a Vehicle, in Particular a Motor Vehicle

Номер: US20130117857A1
Автор: Sebastian ZIMMERMANN
Принадлежит: Bayerische Motoren Werke AG

The invention relates to a method for processing data in one or more control devices of a vehicle, in particular a motor vehicle. According to the invention, a data protection mode for the control device(s) can be activated by a user of the vehicle. In this data protection mode the predetermined data, to which the control device(s) has and/or have access during usage of the vehicle, are prevented from being transmitted out of the vehicle; or transmission of said predetermined data is permitted exclusively after entry of a confirmation requested by the user of the vehicle. As an alternative or in addition, in the data protection mode the predetermined data, which are stored in the control device(s) during usage of the vehicle, are deleted after a predefined period of time.

Подробнее
16-05-2013 дата публикации

Apparatus, system and method of storing, tracking and disseminating documents related to food products

Номер: US20130124457A1
Автор: James W. Parker
Принадлежит: CSM Bakery Products NA Inc

An apparatus used to store, track and disseminate documents related to a food product is a repository that comprises electronic document generator, database, and query module is. The electronic document generator receives a document related to a food product and certificates related to the food product. The electronic document generator generates electronic document based on the document including the product information and also generates electronic copies of the certificates. The database is coupled to the electronic document generator and stores the electronic copies of the electronic document and the certificates. The query module is coupled to the database and receives a query related to the food product. The query includes data generated by document recognition or by QR Code scanning. The query module provides access to the electronic document and electronic copies of the certificates associated with the query. Other embodiments are also disclosed.

Подробнее
16-05-2013 дата публикации

Method and system for managing and querying large graphs

Номер: US20130124488A1
Принадлежит: International Business Machines Corp

A method, system and computer program product for managing and querying a graph. The method includes the steps of: receiving a graph; partitioning the graph into homogeneous blocks; compressing the homogeneous blocks; and storing the compressed homogeneous blocks in files where at least one of the steps is carried out using a computer device.

Подробнее
16-05-2013 дата публикации

Visual information search tool

Номер: US20130124507A1
Автор: Richard A. Gartland
Принадлежит: Adobe Systems Inc

The subject matter disclosed herein relates to generating a search result comprising one or more candidate documents selected based at least in part on one or more criteria associated with an input value of a visual information metric.

Подробнее
16-05-2013 дата публикации

Presenting Metadata From Multiple Perimeters

Номер: US20130124583A1

In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata.

Подробнее
16-05-2013 дата публикации

Context aware annotation

Номер: US20130124965A1
Принадлежит: Individual

Various embodiments of systems and methods for context aware annotations are described herein. A user request is received to visualize a dataset according to a user selected visualization type. A visualization of the dataset is created according to the user selected visualization type and the created visualization is displayed on the computer screen. The context information of each region of the displayed visualization is compared with the context information stored in annotations stored in the memory. Based on the comparison, a determination is made whether the context information stored in any of the annotations matches with the context information of any of the regions. The annotation is displayed on the region of the visualization, which has the same context information. In one embodiment, a list of annotations is displayed to the user. The information related to a selected annotation from the list of annotations is displayed to the user.

Подробнее
16-05-2013 дата публикации

Permission re-delegation prevention

Номер: US20130125210A1
Принадлежит: Microsoft Corp

Methods and systems for preventing permission re-delegation among applications are disclosed herein. The method includes accepting a message requesting access to a user-controlled resource from a requester application at a deputy application and reducing a first permissions list of the deputy application to a second permissions list. The second permissions list includes an overlap of permissions between the deputy application and the requester application. Moreover, the method also includes sending the message from the deputy application to a computing system via an application programming interface (API), wherein the computing system is configured to reject the message if the second permissions list of the deputy application does not permit access to the user-controlled resource.

Подробнее
23-05-2013 дата публикации

Content management system that retrieves data from an external data source and creates one or more objects in the repository

Номер: US20130132429A1
Автор: John E. Petri
Принадлежит: International Business Machines Corp

A content management system (CMS) provides a way to include data from an external source as an object in the repository managed by the CMS. The CMS includes an external data mechanism that processes a document with a query to a data source external to the repository. The external data mechanism executes the query, and creates one or more objects in the repository according to the type of data returned. Each object containing data returned from the query is linked to that query via a formal relationship in the CMS. When an object that has a formal relationship with a query is checked out of the repository, the query corresponding to the object may be executed, and the data returned from the query may be stored in the object. Alternatively, the data may be used directly if a corresponding lifecycle policy indicates the corresponding query should not be executed.

Подробнее
23-05-2013 дата публикации

ORGANIZING VERSIONING ACCORDING TO PERMISSIONS

Номер: US20130132439A1
Принадлежит: Apple Inc.

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing data according to permissions. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of identifying a version of a data item to be stored; determining permissions associated with the version of the data item; and storing the version of the data item at a storage location that is based on the determined permissions. 17-. (canceled)8. A method performed by a data processing apparatus , the method comprising:receiving a request from a user for one or more versions of a data item, at least some of the versions of the data item having been generated based on modifications to the data item;identifying the one or more versions of the data item;determining the permissions associated with each version of the one or more versions of the data item; andproviding access only to those versions of the one or more versions of the data item to which the user has permission.9. The method of claim 8 , where determining the permissions includes searching a database for the one or more versions of the data item claim 8 , the database including an ordering of versions for each of a plurality of data items and a location within a permissions tree of each version.10. The method of claim 8 , where the location of each version of the data item is based on the assigned permissions for each respective version of the data item.11. The method of claim 8 , where all identified versions of the one or more versions of the data item are presented claim 8 , but only those to which the user has permissions are accessible.12. The method of claim 8 , where only those versions of the one or more versions of the data item to which the user has permission are presented.1319-. (canceled)20. A system comprising: receiving a request from a user for one or more versions of a data item, at least some of the versions of the data ...

Подробнее
23-05-2013 дата публикации

Content management system that retrieves data from an external data source and creates one or more objects in the repository

Номер: US20130132441A1
Автор: John E. Petri
Принадлежит: International Business Machines Corp

A content management system (CMS) provides a way to include data from an external source as an object in the repository managed by the CMS. The CMS includes an external data mechanism that processes a document with a query to a data source external to the repository. The external data mechanism executes the query, and creates one or more objects in the repository according to the type of data returned. Each object containing data returned from the query is linked to that query via a formal relationship in the CMS. When an object that has a formal relationship with a query is checked out of the repository, the query corresponding to the object may be executed, and the data returned from the query may be stored in the object. Alternatively, the data may be used directly if a corresponding lifecycle policy indicates the corresponding query should not be executed.

Подробнее
23-05-2013 дата публикации

Apparatus and method for hardware-based secure data processing using buffer memory address range rules

Номер: US20130132735A1
Принадлежит: Qualcomm Inc

Disclosed is a processor for processing data from a buffer memory. The processor, implemented in hardware, may allow writing of output data, processed based on input data from at least one secure location associated with a secure address range of the buffer memory, to one or more secure locations associated with the secure address range. Further, the processor may block writing of output data, processed based on input data from at least one secure location associated with the secure address range, to one or more insecure locations associated with an insecure address range of the buffer memory.

Подробнее
30-05-2013 дата публикации

Client-side encryption in a distributed environment

Номер: US20130138955A1
Автор: Jeffrey J. Darcy
Принадлежит: Red Hat Inc

Methods and systems for encrypting and decrypting data are described. In one embodiment, a client computing system sends to a server computing system over a network a first network request to perform multiple operations such as a lease operation and a fetch operation. In response, the server computing system performs the operations. Subsequently, the client computing system can send subsequent network requests to write re-encrypted data and to relinquish the lease. The subsequent network requests may also be single network requests that perform lease operations, as well as other operations, such as operations for block alignment purposes. The client computing system can send an actual end of file when relinquishing the lease so that the server computing system can handle a remainder of data that is used for subsequently decrypting the re-encrypted data.

Подробнее
06-06-2013 дата публикации

Method and apparatus for providing enhanced service authorization

Номер: US20130145435A1
Автор: YAN Fu
Принадлежит: Nokia Oyj

An approach is provided for authorizing one or more services from service providers in a communications network. The approach includes receiving a request from a first service provider, the request having an associated primary token and a secondary token identifier, the secondary token identifier relating to resources of a second service provider. Based, at least in part, on the secondary token identifier, a secondary token is identified; and then the secondary token is sent to the first service provider, wherein the first service provider and the second service provider belong to different trust domains and the first service provider can use the secondary token to access resources of the second service provider.

Подробнее
06-06-2013 дата публикации

Multi Mode Operation Using User Interface Lock

Номер: US20130145453A1
Автор: Steven C. Lemke
Принадлежит: Hewlett Packard Development Co LP

A system and a method are disclosed for a computer implemented method to unlock a mobile computing device and access applications (including services) on a mobile computing device through a launcher. The configuration includes mapping one or more applications with a guest access code. The configuration receives, through a display screen of a mobile computing device, an access code, and determines whether the received access code corresponds with the guest access code. The configuration identifies the mapped applications corresponding to the guest access code and provides for display, on a screen of the mobile computing device, the identified applications.

Подробнее