Data security using multi-factor authentication

    公开(公告)号:US11429741B2

    公开(公告)日:2022-08-30

    申请号:US17111705

    申请日:2020-12-04

    Abstract: Techniques are disclosed relating multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system compares the current contextual information with prior contextual information for database requests and then selects a security level from the different security levels. The computer system then initiates verification of a subset of authentication factors corresponding to the selected security level. In some embodiments, the computer system determines, based on the verification, whether to authorize the requested database operation.

    USING POLICIES TO COMPLY WITH A REQUEST FROM A PERSON FOR DATA THAT PERTAINS TO A PERSON

    公开(公告)号:US20210232700A1

    公开(公告)日:2021-07-29

    申请号:US16752506

    申请日:2020-01-24

    Abstract: Described are methods and systems for using policies to comply with a person's request for data pertaining to the person, pursuant to applicable data privacy laws. A policy is retrieved responsive to receiving a query that includes data to identify records that store data pertaining to the person. The policy indicates first and second database objects, and respective first and second sets of fields, which store data that pertains to persons. The policy is applied. Applying the policy includes retrieving, as first values, data stored in the first set of fields of a first record associated with the data in the query, and retrieving, as second values, data stored in the second set of fields of a second record associated with the first record. The first and second values, and the names of the fields from which they were retrieved, are stored in a document.

    Data security using multi-factor authentication

    公开(公告)号:US11899813B2

    公开(公告)日:2024-02-13

    申请号:US17808842

    申请日:2022-06-24

    CPC classification number: G06F21/6227 G06F21/316 G06F21/34 G06F2221/2113

    Abstract: Techniques are disclosed relating to multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system selects, based on the current contextual information, a security level from the multiple different security levels. In some embodiments, the computer system revokes, based on the selected security level, access privileges of the user for accessing a database corresponding to the database operation request.

    TECHNIQUES AND ARCHITECTURES FOR MANAGING PRIVACY INFORMATION AND PERMISSIONS QUERIES ACROSS DISPARATE DATABASE TABLES

    公开(公告)号:US20200097574A1

    公开(公告)日:2020-03-26

    申请号:US16140428

    申请日:2018-09-24

    Abstract: At least one database table of denormalized values corresponding to selected values of field properties in records across multiple disparate tables of the database environment is maintained. A structured query is received through a structured query language application program interface (API). The structured query to request a listing of records across the multiple disparate tables of the database environment. The database table is searched for indications corresponding to records across the multiple disparate tables of the database environment corresponding to the selected values indicating communication with a specified party. A listing of records from across the multiple disparate tables that satisfy the selected values is returned through the structured query language API.

    UPDATING OF A DENORMALIZED DATABASE OBJECT AFTER UPDATING, DELETING, OR INSERTING A RECORD IN A SOURCE DATABASE OBJECT

    公开(公告)号:US20220083551A1

    公开(公告)日:2022-03-17

    申请号:US17534425

    申请日:2021-11-23

    Abstract: Methods and apparatus for updating a denormalized database object after updating, deleting, or inserting a record in a source database object are described. A first operation on a source database object that involves a record of the source database object being updated, deleted, or inserted is performed. A first part of a corresponding second operation involving a respective record of the denormalized database object being updated, deleted, or inserted is performed. A query result that references an aggregate field of a set of records in the denormalized database object is altered. The altering includes an aggregation operation using values in the query result being performed and altering that part of the query result that includes the aggregate field of the set of records. A second part is optionally performed to complete the corresponding second operation and update the denormalized database object.

    Updating of a denormalized database object after updating, deleting, or inserting a record in a source database object

    公开(公告)号:US11216460B2

    公开(公告)日:2022-01-04

    申请号:US16411107

    申请日:2019-05-13

    Abstract: Methods and apparatus for updating a denormalized database object after updating, deleting, or inserting a record in a source database object are described. A first operation on a source database object that involves a record of the source database object being updated, deleted, or inserted is performed. A first part of a corresponding second operation involving a respective record of the denormalized database object being updated, deleted, or inserted is performed. A query result that references an aggregate field of a set of records in the denormalized database object is altered. The altering includes an aggregation operation using values in the query result being performed and altering that part of the query result that includes the aggregate field of the set of records. A second part is optionally performed to complete the corresponding second operation and update the denormalized database object.

    Data Security Using Multi-Factor Authentication

    公开(公告)号:US20220327231A1

    公开(公告)日:2022-10-13

    申请号:US17808842

    申请日:2022-06-24

    Abstract: Techniques are disclosed relating to multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system selects, based on the current contextual information, a security level from the multiple different security levels. In some embodiments, the computer system revokes, based on the selected security level, access privileges of the user for accessing a database corresponding to the database operation request.

    Data Security Using Multi-Factor Authentication

    公开(公告)号:US20220179989A1

    公开(公告)日:2022-06-09

    申请号:US17111705

    申请日:2020-12-04

    Abstract: Techniques are disclosed relating multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system compares the current contextual information with prior contextual information for database requests and then selects a security level from the different security levels. The computer system then initiates verification of a subset of authentication factors corresponding to the selected security level. In some embodiments, the computer system determines, based on the verification, whether to authorize the requested database operation.

Patent Agency Ranking