Data security using request-supplied keys

GB Roth, EJ Brandwine - US Patent 9,311,500, 2016 - Google Patents
7,890,767 B2 2/2011 Smith et al. 2006/0282878 Al 12/2006 Stanley et al. 7.913, 084 B2
3/2011 Medvinsky et al. 2007/0005955 A1 1/2007 Pyle et al. T. 917.764 B2 3/2011 Futa …

Data security with a security module

GB Roth, MJ Wren, EJ Brandwine, BI Pratt - US Patent 9,367,697, 2016 - Google Patents
8, 140,847 8,245,037 8,261,320 8,302,170 8,607,358 8,713,311 8,751,807 8,804,950
8,904, 181 2002fO141590 2003/0093.694 2003. O131238 2003/O163701 2003/0172269 …

Approaches for ensuring data security

A Tarkhanyan, R Gupta - US Patent 8,556,991, 2013 - Google Patents
US8556991B2 - Approaches for ensuring data security - Google Patents US8556991B2 -
Approaches for ensuring data security - Google Patents Approaches for ensuring data security …

Data security service

GB Roth, MJ Wren, EJ Brandwine, BI Pratt - US Patent 9,590,959, 2017 - Google Patents
8,091,125 B1 1/2012 Hughes et al. 2011/0022642 A1 1/2011 deMilo et al. 8, 111,828 B2
2/2012 Raman et al. 2011 OO72264 A1 3/2011 McNulty 8, 140,847 B1 3, 2012 Wu …

Data security operations with expectations

GA Rubin, GB Roth - US Patent 10,560,441, 2020 - Google Patents
(57) ABSTRACT A cryptography service allows for management of crypto graphic keys and
for the evaluation of security expectations when processing incoming requests. In some …

Database access security

M Raab - US Patent 7,904,454, 2011 - Google Patents
6,304,975 B1 10/2001 Shiple aSa (a. 6,311,272 B1 10/2001 E. 2003/0046302 A1 3/2003
Miron........................ TO7 104.1 6,330,562 B1 12/2001 Boden et al. 2003/0084320 A1 5/2003 …

Managing security groups for data instances

GAM McAlister - US Patent 9,705,888, 2017 - Google Patents
(56) References Cited 2007/0162420 A1 7, 2007 Ou et al. 2007/0174691 A1 7/2007
D'Souza et al. US PATENT DOCUMENTS 2007/0192329 A1 8, 2007 Croft et al …

Column relevant data security label

P Needham, V Pesati - US Patent App. 10/880,301, 2005 - Google Patents
0003) A virtual private database (VPD) enables the bind ing of a stored procedure to
database objects, Such as a tables and views. When the database object is accessed, Such …

Methods for cryptographic delegation and enforcement of dynamic access to stored data

JP McGregor, MN White - US Patent 9,559,837, 2017 - Google Patents
Efficient methods for assigning, revoking, and realizing access to stored data involve a
cryptographic key hierarchy and a set of operations performed on cryptographic keys and …

Key generation for hierarchical data access

GB Roth, MR Barbour, BJ Behm, CM Ilac… - US Patent …, 2015 - Google Patents
TO73, 195 B2 7/2006 Brickell et al. 2006/0100928 A1 5/2006 Waleczak, Jr. et al. 739,917 B2
11/2006 Jablon 2006, O130 100 A1 6, 2006 Pentland 7,228.417 B2 6/2007 Roskind …