WO2008039565A3 - System and method for obfuscation of data across an enterprise - Google Patents
System and method for obfuscation of data across an enterprise Download PDFInfo
- Publication number
- WO2008039565A3 WO2008039565A3 PCT/US2007/067164 US2007067164W WO2008039565A3 WO 2008039565 A3 WO2008039565 A3 WO 2008039565A3 US 2007067164 W US2007067164 W US 2007067164W WO 2008039565 A3 WO2008039565 A3 WO 2008039565A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- rule
- active
- enterprise
- data
- editor
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/02—Knowledge representation; Symbolic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
Abstract
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2663735A CA2663735C (en) | 2006-09-27 | 2007-04-21 | System and method for obfuscation of data across an enterprise |
EP07761079A EP2069959A4 (en) | 2006-09-27 | 2007-04-21 | System and method for obfuscation of data across an enterprise |
NZ575892A NZ575892A (en) | 2006-09-27 | 2007-04-21 | System and method for obfuscation of data across an enterprise |
AU2007300403A AU2007300403B2 (en) | 2006-09-27 | 2007-04-21 | System and method for obfuscation of data across an enterprise |
IL197551A IL197551A0 (en) | 2006-09-27 | 2009-03-12 | System and method for obfuscation of data across an enterprise |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US84801506P | 2006-09-27 | 2006-09-27 | |
US60/848,015 | 2006-09-27 |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2008039565A2 WO2008039565A2 (en) | 2008-04-03 |
WO2008039565A3 true WO2008039565A3 (en) | 2008-08-14 |
WO2008039565A9 WO2008039565A9 (en) | 2009-07-09 |
Family
ID=39230843
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/067164 WO2008039565A2 (en) | 2006-09-27 | 2007-04-21 | System and method for obfuscation of data across an enterprise |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP2069959A4 (en) |
AU (1) | AU2007300403B2 (en) |
CA (1) | CA2663735C (en) |
IL (1) | IL197551A0 (en) |
NZ (1) | NZ575892A (en) |
WO (1) | WO2008039565A2 (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9305180B2 (en) | 2008-05-12 | 2016-04-05 | New BIS Luxco S.à r.l | Data obfuscation system, method, and computer implementation of data obfuscation for secret databases |
CN101739484B (en) | 2008-11-07 | 2012-08-22 | 北京索为高科系统技术有限公司 | Knowledge component-based engineering design method |
US8478706B2 (en) * | 2009-01-30 | 2013-07-02 | Ab Initio Technology Llc | Processing data using vector fields |
CN111177902B (en) * | 2019-12-18 | 2023-10-17 | 北京安怀信科技股份有限公司 | Overall design tool based on system parameters |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4754410A (en) * | 1986-02-06 | 1988-06-28 | Westinghouse Electric Corp. | Automated rule based process control method with feedback and apparatus therefor |
US6240416B1 (en) * | 1998-09-11 | 2001-05-29 | Ambeo, Inc. | Distributed metadata system and method |
US20030093352A1 (en) * | 2001-10-15 | 2003-05-15 | Muralidhar Sanjay P. | Method, apparatus and program for evaluating financial trading strategies and portfolios |
US20050108176A1 (en) * | 2003-04-30 | 2005-05-19 | Jarol Scott B. | Configurable rules based content item consumption |
-
2007
- 2007-04-21 EP EP07761079A patent/EP2069959A4/en not_active Withdrawn
- 2007-04-21 WO PCT/US2007/067164 patent/WO2008039565A2/en active Application Filing
- 2007-04-21 CA CA2663735A patent/CA2663735C/en active Active
- 2007-04-21 AU AU2007300403A patent/AU2007300403B2/en active Active
- 2007-04-21 NZ NZ575892A patent/NZ575892A/en unknown
-
2009
- 2009-03-12 IL IL197551A patent/IL197551A0/en unknown
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4754410A (en) * | 1986-02-06 | 1988-06-28 | Westinghouse Electric Corp. | Automated rule based process control method with feedback and apparatus therefor |
US6240416B1 (en) * | 1998-09-11 | 2001-05-29 | Ambeo, Inc. | Distributed metadata system and method |
US20030093352A1 (en) * | 2001-10-15 | 2003-05-15 | Muralidhar Sanjay P. | Method, apparatus and program for evaluating financial trading strategies and portfolios |
US20050108176A1 (en) * | 2003-04-30 | 2005-05-19 | Jarol Scott B. | Configurable rules based content item consumption |
Also Published As
Publication number | Publication date |
---|---|
CA2663735C (en) | 2013-10-01 |
CA2663735A1 (en) | 2008-04-03 |
EP2069959A4 (en) | 2010-08-25 |
AU2007300403A1 (en) | 2008-04-03 |
AU2007300403B2 (en) | 2012-05-24 |
IL197551A0 (en) | 2009-12-24 |
WO2008039565A9 (en) | 2009-07-09 |
WO2008039565A2 (en) | 2008-04-03 |
EP2069959A2 (en) | 2009-06-17 |
NZ575892A (en) | 2012-02-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2008077053A3 (en) | Methods and procedures to provide complete test copy environment of hosted applications | |
WO2006083926A3 (en) | Rules-based system | |
WO2005045740A3 (en) | System and method for preference application installation and execution | |
BR0113136A (en) | computer system and method for designing, planning, modifying or maintaining one or more communication networks | |
CN103368765A (en) | Management system permission adding method and device | |
WO2008039565A9 (en) | System and method for obfuscation of data across an enterprise | |
Fourné et al. | It’s like flossing your teeth: On the importance and challenges of reproducible builds for software supply chain security | |
Brower | What is a cladogram and what is not? | |
Lam | Methods for resolving inconsistencies in ontologies | |
Cotroneo | Innovative technologies for dependable ots-based critical systems | |
RU2419135C1 (en) | System to monitor unavailability of undeclared opportunities in software | |
WO2009154980A3 (en) | Systems and methods for automatically identifying data dependencies for reports, automatic spell checking of dynamically generated web pages, and automatic quality assurance of workflow reports | |
Fehlmann et al. | ART for Agile: Autonomous Real-Time Testing in the Product Development Cycle | |
Li et al. | Explaining the Influence of Workarounds on the Effective Use of a Supply Chain Management System | |
Boateng et al. | Information systems development: where does knowledge lie and how does learning occur? | |
Anand | Instant Approach to Software Testing | |
Fitzgerald et al. | Triumphs and challenges for model-oriented formal methods: The vdm++ experience | |
Smith et al. | Engagement with students in'middle ground': A flexible learning environment allowing simultaneous access to social networking sites and formal academic space | |
Ferrin et al. | Silence Speaks Volumes: The Effectiveness of Reticence for Repairing Trust Violations | |
Michiels | A Goal-Driven Approach for Documenting and Verifying Design Invariants | |
Clark | Project management: the key to engineering employability | |
Etuk et al. | Covid-19 Stigmatisation of Foreign Students: Human Rights’ Laws, Marketing and International Relations’ Implications | |
Michiels et al. | BEHAVE: Lightweight Verification Using High-Level Behavioral Models | |
Goldstein | Software, epidemiological | |
Devroey | YAMI: Yet Another Model Inference tool |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07761079 Country of ref document: EP Kind code of ref document: A2 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007300403 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007761079 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2663735 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 575892 Country of ref document: NZ |
|
ENP | Entry into the national phase |
Ref document number: 2007300403 Country of ref document: AU Date of ref document: 20070421 Kind code of ref document: A |