Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

102results about How to "Preventing number" patented technology

Complementary Character Encoding for Preventing Input Injection in Web Applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Complementary character encoding for preventing input injection in web applications

Method to prevent the effect of web application injection attacks, such as SQL injection and cross-site scripting (XSS), which are major threats to the security of the Internet. Method using complementary character coding, a new approach to character level dynamic tainting, which allows efficient and precise taint propagation across the boundaries of server components, and also between servers and clients over HTTP. In this approach, each character has two encodings, which can be used to distinguish trusted and untrusted data. Small modifications to the lexical analyzers in components such as the application code interpreter, the database management system, and (optionally) the web browser allow them to become complement aware components, capable of using this alternative character coding scheme to enforce security policies aimed at preventing injection attacks, while continuing to function normally in other respects. This approach overcomes some weaknesses of previous dynamic tainting approaches by offering a precise protection against persistent cross-site scripting attacks, as taint information is maintained when data is passed to a database and later retrieved by the application program. The technique is effective on a group of vulnerable benchmarks and has low overhead.
Owner:POLYTECHNIC INSTITUTE OF NEW YORK UNIVERSITY

Methods and infrastructure for performing repetitive data protection and a corresponding restore of data

According to the present invention methods and an infrastructure are provided for performing repetitive data protection and a corresponding restore of data for block oriented data objects comprising several indexed segments.For implementing the invention, timestamps tk are set by a time k; and only the first data modification of a segment is recorded, after a timestamp tk has been set, by storing the old data contents of said segment together with the segment index i an said timestamp tk as undo-log block in a journal, first, before overwriting said segment with the modified new data. The main idea of the invention is that the undo-log blocks of the segments are distributed to N journals jn, wherein N>1 and n=0, . . . , N-1, such thata) at time tn+(m·N) (0≦n<N) at most m+1 undo-log blocks corresponding to the same segment are recorded in the journal j0,b) during the time interval [tk+(m·N), t(m+1)·N) no duplicates are recorded in the union of journals j0, . . . jk, (0≦k<N), andc) an undo-log block is written to journal jn+(m·N) (0<n<N) if and only if the corresponding segment was modified in time interval [t(n-1)+(m·N), tn+(m·N)) for the last time before the current modification;wherein m=0, 1, . . . ∞ and wherein the timestamps t(m·N) represent consecutive reset points.Then, only journals j0, . . . , jk are needed for a point in time restore of time rk+(m·N) and all changes that were written after t(m+1)·N located in journal j0. Thus, the present invention allows to reduce the amount of data that needs to be read from the journals in order to recover the system to a given point in time.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products