Keyword search on ‘computer science’

Patent Title Description Patent Number
Multi-user permission strategy to access sensitive information, AKA Shared TrustThe major reason of sensitive and intellectual property data breach is malicious insiders who had the access rights, knowledge of data values and technical know- how of escalating their privileges in launching such insider attacks. Traditional access control policies were framed according to the trust on legitimate users’ access rights (read, write and execute) based on their jobs and role hierarchy in an organization. However, misuse of such privileges is increasing day by day. This innovative work introduces a multi- user permission strategy by considering role based organizational structure. According to sensitivity of the classified file access being requested by a user, approvers are selected dynamically satisfying certain conditions.10671747
Efficient Forwarding Information Base Caching Systems and MethodsThe invention could result in a new hardware implementation for Network Processor Unit and being used by Internet Service Providers to save operational costs10091105
Memory Devices, Methods of Storing and Reading Data, SMM Junctions, and Methods of Preparing Alumina SubstratesThe various aspects of the invention provide memory devices, methods of storing and reading data, and silver/molecular-layer/metal (SMM) junctions.9183927
Methods of Evaluating Semantic Differences, Methods of Identifying Related Sets of Items in Semantic Spaces, and Systems and Computer Program Products For Implementing the SameThis process provides a method for evaluating semantic spaces within a unified theoretical framework.9158841
Adaptive Multi-Factor Authentication System and Multi-User Permission Strategy to Access Sensitive Information Systems and related methods for providing greater security and control over access to protected or classified resources, files and documents and other forms of sensitive information based upon an initial adaptive selection of multiple modalities for authentication in different operating environments, with subsequent multi-user permission strategy centering on organizational structure. The system calculates trustworthiness values of different authentication factors under various environmental settings, and combines a trust-based adaptive, robust and scalable software-hardware framework for the selection of authentication factors for continuous and triggered authentication with optimal algorithms to determine the security parameters of each of the authentication factors. A subset of authentication factors thus are determined for application at triggering events on-the-fly, thereby leaving no exploitable a priori pattern or clue for hackers to exploit. Upon authentication of an access request, based on the sensitivity or classification of the information being requested by a user, approvers are selected dynamically based on the work environment (e.g., mobility, use of the computing device seeking access, access policy, and the like). The selected sets of approvers are non-repetitive in nature.11038896