Rapid initial deployment database security model

    公开(公告)号:US12003542B2

    公开(公告)日:2024-06-04

    申请号:US17148684

    申请日:2021-01-14

    Abstract: A method, system, and computer program product for recommending an initial database security model. The method may include identifying a plurality of nodes connected to a security network. The method may also include analyzing security characteristics of each node of the plurality of nodes. The method may also include identifying, from the security characteristics, key factors for each node. The method may also include calculating similarities between each node of the plurality of nodes. The method may also include building a self-organized centerless network across the plurality of nodes by grouping nodes with high similarities based on the similarities between each node, where the self-organized centerless network is a centerless network without a central management server, and includes groups of nodes from the plurality of nodes. The method may also include generating federated security models for the groups of nodes.

    RAPID INITIAL DEPLOYMENT DATABASE SECURITY MODEL

    公开(公告)号:US20220224722A1

    公开(公告)日:2022-07-14

    申请号:US17148684

    申请日:2021-01-14

    Abstract: A method, system, and computer program product for recommending an initial database security model. The method may include identifying a plurality of nodes connected to a security network. The method may also include analyzing security characteristics of each node of the plurality of nodes. The method may also include identifying, from the security characteristics, key factors for each node. The method may also include calculating similarities between each node of the plurality of nodes. The method may also include building a self-organized centerless network across the plurality of nodes by grouping nodes with high similarities based on the similarities between each node, where the self-organized centerless network is a centerless network without a central management server, and includes groups of nodes from the plurality of nodes. The method may also include generating federated security models for the groups of nodes.

    Generating a virtual database to test data security of a real database

    公开(公告)号:US10362052B2

    公开(公告)日:2019-07-23

    申请号:US15814560

    申请日:2017-11-16

    Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.

    Generating a virtual database to test data security of a real database

    公开(公告)号:US10171487B2

    公开(公告)日:2019-01-01

    申请号:US15433067

    申请日:2017-02-15

    Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.

    Generating a Virtual Database to Test Data Security of a Real Database

    公开(公告)号:US20180234449A1

    公开(公告)日:2018-08-16

    申请号:US15433067

    申请日:2017-02-15

    Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.

    REFINING DIGITAL TWIN TO IMPROVE PHYSICAL ENTITY

    公开(公告)号:US20240428077A1

    公开(公告)日:2024-12-26

    申请号:US18337501

    申请日:2023-06-20

    Abstract: A method, computer system, and a computer program product for digital twin usage are provided. A first digital twin and performance data of the first digital twin are input into a first machine learning model to produce a second digital twin. The first machine learning model performs neural network-based data clustering. The first and second digital twins digitally represent a first physical entity. The second digital twin includes one or more changes from the first digital twin. Performance data of the second digital twin is analyzed. In response to the analysis indicating a problem with the second digital twin, implementation of the second digital twin is revoked and the first digital twin is reimplemented

    ASSOCIATING KEYWORDS FROM COMMUNICATION CONTENT WITH COMMUNICATION PARTICIPANTS
    8.
    发明申请
    ASSOCIATING KEYWORDS FROM COMMUNICATION CONTENT WITH COMMUNICATION PARTICIPANTS 审中-公开
    与通信参与者的通信内容相关的关键词

    公开(公告)号:US20160357749A1

    公开(公告)日:2016-12-08

    申请号:US14730708

    申请日:2015-06-04

    CPC classification number: G06Q10/10 H04M3/42221 H04M2201/22 H04M2203/301

    Abstract: Embodiments of the present invention provide systems, methods, and program products for associating keywords from communication content with communication participants. Embodiments of the present invention can be used to associate communication metadata based, at least in part on one or more keywords extracted from communication content. Embodiments of the present invention can be used to improve message communications by identifying participants, not known to a user, by some other identifier (such as a keyword) based, at least in part, on communication content.

    Abstract translation: 本发明的实施例提供用于将来自通信内容的关键词与通信参与者相关联的系统,方法和程序产品。 至少部分地基于从通信内容中提取的一个或多个关键字,本发明的实施例可用于关联通信元数据。 本发明的实施例可以用于至少部分地基于通信内容的一些其他标识符(诸如关键字)来识别用户不知道的参与者来改善消息通信。

Patent Agency Ranking