Search

Ulf Mattsson Phones & Addresses

  • 47 Hills Ln, Westport, CT 06880
  • 78 River Rd APT 3, Cos Cob, CT 06807 (203) 629-5122
  • Weston, CT
  • Deep River, CT

Work

Company: Protegrity Jun 2020 Position: Chief security strategist

Education

Degree: Masters School / High School: Chalmers University of Technology 1975 to 1979 Specialities: Physics, Engineering, Finance

Skills

Security • Cloud Computing • Enterprise Software • Information Security • Software Development • Data Security • Pci Dss • Information Technology • Databases • Encryption • Product Management • Computer Security • Enterprise Architecture • Solution Architecture • Architecture • Crm • Information Security Management • Cissp • Database Security • Business Process • Cryptography • Microsoft Sql Server • Network Security • Strategy • Application Security • Cloud Security • Scalability • Key Management • Security Audits • Pki • Compliance Management • Information Security Policy • Internet Security • Cyber Security • It Governance • Vulnerability Assessment • Governance • Big Data • Web Application Security • Security Assessments • Solution Design • Privacy Law • Privacy • Patents • Innovation • System Architecture • Distributed Systems • Hipaa • State Legislation • Cisp

Languages

Swedish • German

Ranks

Certificate: Ibm Ceritified It Architect

Interests

Children • Education • Sailing • Science and Technology • Tennis • Golf

Industries

Information Technology And Services

Resumes

Resumes

Ulf Mattsson Photo 1

Chief Security Strategist

View page
Location:
Atlanta, GA
Industry:
Information Technology And Services
Work:
Protegrity
Chief Security Strategist

Tagore Ab
Technology Advisor

Glg (Gerson Lehrman Group)
Glg Council Member

Quantum Computing
Advisory Board Member

Brighttalk
I Own and Manage This Brighttalk Channel: the Blockchain Channel
Education:
Chalmers University of Technology 1975 - 1979
Masters, Physics, Engineering, Finance
University of Stockholm 1978 - 1979
Master of Business Administration, Masters, Finance
Polhem Institute of Technology 1970 - 1974
Bachelors, Bachelor of Science, Electronics Engineering
Skills:
Security
Cloud Computing
Enterprise Software
Information Security
Software Development
Data Security
Pci Dss
Information Technology
Databases
Encryption
Product Management
Computer Security
Enterprise Architecture
Solution Architecture
Architecture
Crm
Information Security Management
Cissp
Database Security
Business Process
Cryptography
Microsoft Sql Server
Network Security
Strategy
Application Security
Cloud Security
Scalability
Key Management
Security Audits
Pki
Compliance Management
Information Security Policy
Internet Security
Cyber Security
It Governance
Vulnerability Assessment
Governance
Big Data
Web Application Security
Security Assessments
Solution Design
Privacy Law
Privacy
Patents
Innovation
System Architecture
Distributed Systems
Hipaa
State Legislation
Cisp
Interests:
Children
Education
Sailing
Science and Technology
Tennis
Golf
Languages:
Swedish
German
Certifications:
Ibm Ceritified It Architect
Ibm Nordic

Business Records

Name / Title
Company / Classification
Phones & Addresses
Ulf T. Mattsson
Chief Technology Officer, Executive Officer
PROTEGRITY USA INC
Security Systems Services
5 High Rdg Park, Stamford, CT 06905
5 High Rdg Park 2, Stamford, CT 06905
(203) 326-7200
Ulf Mattsson
Chief Technology Officer
DECARO REAL ESTATE DEVELOPMENT, LLC
Business Services · Investor · Restaurant Management Services
24 Plum Bch Pt Rd, Port Washington, NY 11050
1177 Summer St, Stamford, CT 06905
260 Compo Rd S, Westport, CT 06880
(203) 356-1300

Publications

Us Patents

Combined Hardware And Software Based Encryption Of Databases

View page
US Patent:
6963980, Nov 8, 2005
Filed:
Nov 16, 2000
Appl. No.:
09/712941
Inventors:
Ulf Mattsson - Stamford CT, US
Assignee:
Protegrity Corporation - Grand Cayman
International Classification:
G06F011/30
G06F012/14
H04L009/32
US Classification:
713194, 713193
Abstract:
A relational database system for encryption of individual data elements comprising a encryption devices of at least two different types, the types being tamper-proof hardware and software implemented. The encryption processes of the system are of at least two different security levels, differing in the type of encryption device holding the process keys for at least one of the process key categories and also differing in which type of device executing the algorithm of the process. Each data element to be protected is assigned an attribute indicating the usage of encryption process of a certain security level.

Method For Intrusion Detection In A Database System

View page
US Patent:
7120933, Oct 10, 2006
Filed:
Dec 28, 2001
Appl. No.:
10/034996
Inventors:
Ulf Mattsson - Stamford CT, US
Assignee:
Protegrity Corporation
International Classification:
G06F 11/00
G06F 11/30
H04K 1/00
G06K 12/14
G06F 1/00
US Classification:
726 22, 726 23, 713189, 713194, 705 51, 705 54, 705405
Abstract:
A method for detecting intrusion in a database, managed by an access control system, includes defining at least one intrusion detection profile and associating each user with one of said profiles. Each profile includes at least one item access rate. Further, the method determines whether a result of a query exceeds any one of the item access rates defined in the profile associated with the user. In such a case, the access control system is notified to alter the user authorization, thereby making the received request an unauthorized request, before the result is transmitted to the user. Such a method allows for a real time prevention of intrusion by letting the intrusion detection process interact directly with the access control system, and change the user authority dynamically as a result of the detected intrusion.

Method For Intrusion Detection In A Database System

View page
US Patent:
7305707, Dec 4, 2007
Filed:
Aug 25, 2006
Appl. No.:
11/510185
Inventors:
Ulf Mattsson - Cos Cob CT, US
Assignee:
Protegrity Corporation - Grand Cayman
International Classification:
G06F 11/00
G06F 11/30
G06F 1/00
G06F 7/00
G06F 13/00
G06F 15/00
US Classification:
726 22, 713187, 713193
Abstract:
A method for detecting intrusion in a database, managed by an access control system, includes defining at least one intrusion detection profile and associating each user with one of said profiles. Each profile includes at least one item access rate. Further, the method determines whether a result of a query exceeds any one of the item access rates defined in the profile associated with the user. In such a case, the access control system is notified to alter the user authorization, thereby making the received request an unauthorized request, before the result is transmitted to the user. Such a method allows for a real time prevention of intrusion by letting the intrusion detection process interact directly with the access control system, and change the user authority dynamically as a result of the detected intrusion.

Method For Altering Encryption Status In A Relational Database In A Continuous Process

View page
US Patent:
7325129, Jan 29, 2008
Filed:
Nov 16, 2000
Appl. No.:
09/712926
Inventors:
Ulf Mattsson - Stamford CT, US
Tamojit Das - Stamford CT, US
Assignee:
Protegrity Corporation - Grand Cayman
International Classification:
H04L 9/00
H04L 9/32
H04L 9/28
G06F 11/30
G06F 12/14
H04K 1/00
G06F 15/16
G06F 7/04
G06F 7/58
G06F 12/00
G06F 17/30
G06K 9/00
G06K 19/00
US Classification:
713164, 713193, 713165, 380 28, 707200, 707201, 707203, 707204, 726 6
Abstract:
A method for altering encryption status in a relational database in a continuous process, wherein at least one table of said database comprises at least one base area and at least one maintenance area, comprising the steps of: copying all records from said base area to said maintenance area; directing action of commands intended for said base area to said maintenance area; altering encryption status of said base area; copying all data records from said maintenance area to said base area; and redirecting action of commands to said base area.

Data Type Preserving Encryption

View page
US Patent:
7418098, Aug 26, 2008
Filed:
Nov 27, 2000
Appl. No.:
09/721942
Inventors:
Ulf Mattsson - Stamford CT, US
Kenneth Blomkvist - Skelleftea, SE
Assignee:
Protegrity Corporation - Stamford CT
International Classification:
H04L 9/28
US Classification:
380 28, 380 29, 380 37, 380 42, 713193
Abstract:
A method and a system for encryption of a data element in a relational database, wherein each data element includes a string of at least one character. The method includes the steps of: reading the type of a data element which is to be encrypted; interpreting the data type to form a restricting character set for each character of the data element; and encrypting each character of the data element into an encrypted character selected from the restricting character set.

Data Security And Intrusion Detection

View page
US Patent:
7594266, Sep 22, 2009
Filed:
Sep 29, 2006
Appl. No.:
11/540467
Inventors:
Ulf Mattsson - Cos Cob CT, US
Mike Hsu - San Jose CA, US
Assignee:
Protegrity Corporation - Stamford CT
International Classification:
G06F 11/00
G06F 11/22
G06F 12/14
G06F 1/00
US Classification:
726 22, 726 23, 726 24
Abstract:
Systems and methods are provided for the detection and prevention of intrusions in data at rest systems such as file systems and web servers. Item requests are examined to determine if the request and/or the result violates an item access rule. If either the request or the result violates the item access rule, an access control manager is alerted and appropriate action is taken such as not complying with the item request. Embodiments of the invention also produce a scorecard to represent the severity of an intrusion threat.

Method For Reencryption Of A Database

View page
US Patent:
7984025, Jul 19, 2011
Filed:
Feb 9, 2009
Appl. No.:
12/378042
Inventors:
Thomas Valfridsson - Skellefteå, SE
Ulf Mattsson - Cos Cob CT, US
Assignee:
Protegrity Corporation - Stamford CT
International Classification:
G06F 17/00
US Classification:
707689, 707609, 707708, 707757, 726 26, 726 27, 380 44, 380277, 713164, 713165, 713167, 713193
Abstract:
The present invention relates to a method for encryption of the content in a database, for accomplishing increased protection against unauthorised access to the data. The method assures that every row and item is re-encrypted with a valid key. More specifically this process, the so-called KeyLife process, is executed every time a row is inserted, updated or retrieved after a scanning operation. The key life value, defining the number of days a key is valid for each item, could differ for the items, and could typically be between 30 and 90 days. The scanning operation, checking the validity of the presently used keys, the so-called KeyLife checking, is executed each time a new key generation is created.

Differential Encryption Utilizing Trust Modes

View page
US Patent:
8225106, Jul 17, 2012
Filed:
Apr 2, 2008
Appl. No.:
12/080390
Inventors:
Ulf Mattsson - Cos Cob CT, US
Assignee:
Protegrity Corporation - Grand Cayman
International Classification:
G06F 11/30
US Classification:
713189, 713150, 713155, 713182, 726 2, 726 16, 726 17, 726 18, 726 19, 726 20, 726 21, 380 44, 380277, 380278, 380279, 705 50, 705 64, 705 67, 705 71, 705 72, 705 73, 705 76
Abstract:
Systems and methods are provided for data protection across connected, disconnected, attended, and unattended environments. Embodiments of the inventions may include differential encryption based on network connectivity, attended/unattended status, or a combination thereof. Additional embodiments of the invention incorporate “trust windows” that provide granular and flexible data access as function of the parameters under which sensitive data is accessed. Further embodiments refine the trust windows concept by incorporating dynamic intrusion detection techniques.
Ulf T Mattsson from Westport, CT, age ~68 Get Report