Patent application number | Description | Published |
20100186067 | Methods for Secure Data Distribution - A method for secure distribution of data in an interchange network, comprises having a network in which data records stored on at least one computer; and including an authorization service, where the authorization service grants a contractor access to at least a portion of the data records; and a watermarking module that adds one or more artificial records to said portion. The artificial records cannot be distinguished from the data records by the contractor and are valid for processing in the same way as the data records. | 07-22-2010 |
20100262559 | Modelling Computer Based Business Process And Simulating Operation - Modelling a computer based business process having a number of functional steps, involves providing software candidate models ( | 10-14-2010 |
20100280863 | Automated Model Generation For Computer Based Business Process - A system for generating a model representing an existing computer based business process involves analysing existing source content ( | 11-04-2010 |
20100281069 | ARTIFICIAL RECORD ADDED TO A DATABASE - A method comprises receiving a database containing records. The method further comprises determining a number of artificial records to add to the database to achieve a false negative mark detection rate less than a specified threshold. The method also comprises marking the database by adding the determined number of artificial records to the database. Each artificial record contains at least one value that, when used, is detectable by a third party. The false negative rate comprises a probability of failing to detect the mark in a discovered subset of the database. | 11-04-2010 |
20100325095 | PERMUTING RECORDS IN A DATABASE FOR LEAK DETECTION AND TRACING - A method comprises receiving, by a processor, a copy of a database containing records, each record having a plurality of attributes. The method also comprises determining, by the processor, whether a first attribute in each record results in a predetermined value in modulo P when hashed with a key and determining, by the processor, whether a second attribute in each record results in the predetermined value in modulo P when hashed with a key. For a first record whose first attribute results in the predetermined value in modulo P when hashed with a key and a second record whose second attribute also results in the predetermined value in modulo P when hashed with a key, the method further comprises swapping by the processor the second attributes between the first and second records. | 12-23-2010 |
20110004564 | Model Based Deployment Of Computer Based Business Process On Dedicated Hardware - A method of automated deployment managed by a service provider, of a computer based business process, involves generating a model ( | 01-06-2011 |
20110055166 | FINGERPRINTING A DATABASE - A method comprising fingerprinting, by the at least one processor, a first copy of a database with a fingerprint. The fingerprint has at least one part in common with another fingerprint used in another copy of the database, and at least one part unique to the first copy of the database. The fingerprinting comprises swapping attributes between multiple records in the first copy of the database. | 03-03-2011 |
20120023544 | DATA ASSURANCE - Data assurance capabilities are received that are related to at least one individual persistent object type in a plurality of persistent object types linked to persistent objects stored on the service provider server. In addition, data assurance specifications are received from a customer, the data assurance specifications being based on the data assurance capabilities. Computer-readable data assurance policies for the at least one persistent object type are generated based on the received data assurance specification. The computer-readable data assurance policies then are combined with a corresponding template of data assurance capabilities for the at least one individual persistent object type to generate an enforceable customer-specific data policy. | 01-26-2012 |
20120030120 | ENFORCEMENT OF SECURITY REQUIREMENTS FOR A BUSINESS MODEL - A functional model of a business process which is annotated with security requirements is provided. Platform-specific executable code and at least one configuration file for a given security enforcement component to enforce the security requirements of the model are then generated automatically. | 02-02-2012 |
20120243687 | ENCRYPTION KEY FRAGMENT DISTRIBUTION - An encryption key may be fragmented into n encryption key fragments such that k09-27-2012 | |
20130346339 | CONFIGURING PROCESS VARIANTS FOR ON-BOARDING CUSTOMERS FOR INFORMATION TECHNOLOGY (IT) OUTSOURCING - Systems and methods of configuring process variants for on-boarding customers for information technology (IT) outsourcing are provided. An example method includes modeling roles, responsibilities, and business context for a standard process template. The method also includes developing cause-and-effect rules affecting outcome of the standard process template. The method also includes adjusting the standard process template for process variants across different customer on-boarding scenarios. | 12-26-2013 |