Patents by Inventor Swetta Singh

Swetta Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9336408
    Abstract: Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls.
    Type: Grant
    Filed: October 10, 2014
    Date of Patent: May 10, 2016
    Assignee: SAP SE
    Inventors: John C. Radkowski, Swetta Singh
  • Publication number: 20150033367
    Abstract: Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls.
    Type: Application
    Filed: October 10, 2014
    Publication date: January 29, 2015
    Inventors: John C. Radkowski, Swetta Singh
  • Patent number: 8904557
    Abstract: Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: December 2, 2014
    Assignee: SAP AG
    Inventors: John C. Radkowski, Swetta Singh
  • Patent number: 8869234
    Abstract: Embodiments dynamically manage privileged access to a computer system according to policies enforced by rule engine. User input to the rule engine may determine an extent of system access, as well as other features such as intensity of user activity logging (including logging supplemental to a system activity log). Certain embodiments may provide access based upon user selection of a pre-configured ID at a dashboard, while other embodiments may rely upon direct user input to the rule engine to generate an ID at a policy enforcement point. Embodiments of methods and apparatuses may be particularly useful in granting and/or logging broad temporary access rights allowed based upon emergency conditions.
    Type: Grant
    Filed: May 3, 2012
    Date of Patent: October 21, 2014
    Assignee: SAP AG
    Inventors: John Christopher Radkowski, Swetta Singh
  • Publication number: 20130298186
    Abstract: Embodiments dynamically manage privileged access to a computer system according to policies enforced by rule engine. User input to the rule engine may determine an extent of system access, as well as other features such as intensity of user activity logging (including logging supplemental to a system activity log). Certain embodiments may provide access based upon user selection of a pre-configured ID at a dashboard, while other embodiments may rely upon direct user input to the rule engine to generate an ID at a policy enforcement point. Embodiments of methods and apparatuses may be particularly useful in granting and/or logging broad temporary access rights allowed based upon emergency conditions.
    Type: Application
    Filed: May 3, 2012
    Publication date: November 7, 2013
    Applicant: SAP AG
    Inventors: John Christopher Radkowski, Swetta Singh
  • Publication number: 20130212711
    Abstract: Extracting data from a source system includes generating an authorization model of the data protection controls applied to the extracted data by the source system. The authorization model is used to map the data protection control applied to the extracted data to generate corresponding data protection controls provided in target system. The extracted data is imported to the target system including implementing the corresponding data protection controls.
    Type: Application
    Filed: February 15, 2012
    Publication date: August 15, 2013
    Applicant: SAP AG
    Inventors: John C. Radkowski, Swetta Singh