Patents by Inventor Rafae Bhatti

Rafae Bhatti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9954865
    Abstract: A system may include first sensor to monitor first information relating a volume of information searched by a user, a second sensor to monitor second information relating to a number of requests, made by the user, to access a resource, a third sensor to monitor third information relating to a number of requests, made by the user, from different geographic locations, and a device to receive the first information, the second information, and the third information, and process the first information, the second information, and the third information in connection with the resource.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: April 24, 2018
    Assignee: Accenture Global Services Limited
    Inventors: Malek Ben Salem, Rafae Bhatti, James Solderitsch
  • Patent number: 9477671
    Abstract: A system providing a method for implementing effective date constraints in a role hierarchy is described. In one embodiment, for example, the method comprises the steps of: storing data that represents a first effective date constraint on a role of a role hierarchy, the first effective date constraint having a start date and an end date; storing data in a database that represents a second effective date constraint on a grant of the role to a grantee, the second effective date constraint having a start date and an end date; storing data in a database that represents a third effective date constraint on the grantee, the third effective date constraint having a start date and an end date; and computing a net effective date constraint for the role by computing the intersection of the first effective date constraint, the second effective date constraint, and the third effective date constraint.
    Type: Grant
    Filed: May 27, 2009
    Date of Patent: October 25, 2016
    Assignee: Oracle International Corporation
    Inventors: Rafae Bhatti, Janaki Narasinghanallur, Thomas Keefe, Vikram Pesati
  • Patent number: 9438632
    Abstract: A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.
    Type: Grant
    Filed: February 20, 2015
    Date of Patent: September 6, 2016
    Assignee: Accenture Global Services Limited
    Inventors: Rafae Bhatti, Paul D. Martin
  • Publication number: 20150381631
    Abstract: A system may include first sensor to monitor first information relating a volume of information searched by a user, a second sensor to monitor second information relating to a number of requests, made by the user, to access a resource, a third sensor to monitor third information relating to a number of requests, made by the user, from different geographic locations, and a device to receive the first information, the second information, and the third information, and process the first information, the second information, and the third information in connection with the resource.
    Type: Application
    Filed: September 4, 2015
    Publication date: December 31, 2015
    Inventors: Malek Ben SALEM, Rafae BHATTI, James SOLDERITSCH
  • Publication number: 20150163252
    Abstract: A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.
    Type: Application
    Filed: February 20, 2015
    Publication date: June 11, 2015
    Inventors: Rafae Bhatti, Paul D. Martin
  • Patent number: 8984583
    Abstract: A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: March 17, 2015
    Assignee: Accenture Global Services Limited
    Inventors: Rafae Bhatti, Paul D. Martin
  • Publication number: 20130326579
    Abstract: A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.
    Type: Application
    Filed: March 13, 2013
    Publication date: December 5, 2013
    Inventors: Rafae Bhatti, Paul D. Martin
  • Publication number: 20100306268
    Abstract: A system providing a method for implementing effective date constraints in a role hierarchy is described. In one embodiment, for example, the method comprises the steps of: storing data that represents a first effective date constraint on a role of a role hierarchy, the first effective date constraint having a start date and an end date; storing data in a database that represents a second effective date constraint on a grant of the role to a grantee, the second effective date constraint having a start date and an end date; storing data in a database that represents a third effective date constraint on the grantee, the third effective date constraint having a start date and an end date; and computing a net effective date constraint for the role by computing the intersection of the first effective date constraint, the second effective date constraint, and the third effective date constraint.
    Type: Application
    Filed: May 27, 2009
    Publication date: December 2, 2010
    Inventors: Rafae Bhatti, Janaki Narasinghanallur, Thomas Keefe, Vikram Pesati