Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Patents

Searches Patent Title, Abstract, Body, Technology Type, and NIST Inventors
Displaying 1 - 7 of 7
Graphic with multiple blocks showing a knowledge management system

Knowledge Management System and Process for Managing Knowledge

NIST Inventors
John T. Elliott , Talapady N. Bhat , Ursula R. Kattner , Carelyn E. Campbell , Ram D. Sriram , Eswaran Subrahmanian and Jacob Collard
A knowledge management system includes: a default knowledge system including: a knowledge system and a knowledge database in communication with the knowledge system; and a knowledge store in communication with the default knowledge system and including: a taxonomy amendment, an annotation amendment

Active Security Token with Security Phantom for Porting a Password File

An active security token includes: a sentry that controls access to token data disposed on the active security token through verification of user authentication data; the token data including: reference authentication data for verification of user authentication data; and a security phantom

Oracle-Free Match Testing of a Program Using Covering Arrays and Equivalence Classes

NIST Inventors
D. Richard Kuhn and Raghu N Kacker
This is a method and software for testing computer software. The method applies to a broad range of software but is particularly applicable to software with complex conditions and decisions, e.g., process control, avionics, and other areas. This method also verifies equivalence classes for module
Diagram showing the system and process for controlling database access.

Next Generation Access Control System and Process for Controlling Database Access

NIST Inventors
Joshua Roberts , Gopi Katwala and David Ferraiolo
Provides a universal access control layer between applications and DBMSs, following a standardized ABAC model (NGAC*) that is a) DBMS-agnostic, b) does not require modification of the DBMS software, and c) can enforce types of access policies and at a granularity not typically available in database
Was this page helpful?