会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 61. 发明授权
    • Method and system for scheduling the use of a computer system resource
using a resource planner and a resource provider
    • 使用资源规划者和资源提供者调度计算机系统资源使用的方法和系统
    • US6003061A
    • 1999-12-14
    • US569048
    • 1995-12-07
    • Michael B. JonesPaul J. LeachRichard P. Draves, Jr.Joseph S. Barrera, IIISteven P. LeviRichard F. RashidRobert P. Fitzgerald
    • Michael B. JonesPaul J. LeachRichard P. Draves, Jr.Joseph S. Barrera, IIISteven P. LeviRichard F. RashidRobert P. Fitzgerald
    • G06F9/50G06F9/00
    • G06F9/50G06F2209/5014
    • A method and system for scheduling the use of a computer system resource using a resource planner and a resource provider is provided. In a preferred embodiment, a resource is scheduled for use by a plurality of consumer entities. Each consumer entity may request the commitment of a share of the resource. The method and system utilizes representations of resource usage policy, present commitments of shares of the resource, and present commitments of specified amounts of the resource over specified period of time. The method and system first receives a request from a consumer entity for the commitment of a specified share of the resource. In response, the method and system determines whether the specified share of the resource should be committed to the requesting consumer entity. This determination is based on the representations of resource usage policy and present commitments of shares of the resource. If it is determined that the specified share of the resource should be committed to the requesting consumer entity, then the method and system modifies the representation of present commitments of shares of the resource to commit the specified share of the resource to the requesting consumer entity. The method and system then schedules the use of the resource by the plurality of consumer entity based on the modified representation of present commitments of shares of the resource.
    • 提供了一种用于使用资源规划器和资源提供者来调度计算机系统资源的使用的方法和系统。 在优选实施例中,资源被调度为由多个消费者实体使用。 每个消费者实体可以请求资源份额的承诺。 该方法和系统利用资源使用政策的表示,资源份额的现有承诺以及指定时间内资源规定数量的承诺。 方法和系统首先从消费者实体接收对资源的指定份额的承诺的请求。 作为响应,方法和系统确定资源的指定份额是否应该提交给请求的消费者实体。 这一决定是基于资源使用政策的表示和资源份额的现有承诺。 如果确定资源的指定份额应该提交给请求的消费者实体,那么该方法和系统将修改资源共享的当前承诺的表示,以将该资源的指定份额提交给请求的消费者实体。 该方法和系统随后基于对资源份额的当前承诺的修改表示来安排多个消费者实体对资源的使用。
    • 64. 发明授权
    • Distributed computer systems with time-dependent credentials
    • 具有时间依赖凭证的分布式计算机系统
    • US08640210B2
    • 2014-01-28
    • US13224257
    • 2011-09-01
    • Mark NovakPaul J. LeachYi ZengSaurav SinhaK Michiko ShortGopinathan Kannan
    • Mark NovakPaul J. LeachYi ZengSaurav SinhaK Michiko ShortGopinathan Kannan
    • G06F21/00H04L9/32H04L9/00H04L29/06G06F15/00
    • H04L63/0846
    • A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.
    • 分布式系统,其中根据不同的本地时间操作的控制器提供时间依赖的凭证。 通过识别在过渡间隔期间生成的凭证可以避免控制器因产生时间偏差而产生不一致凭据的错误,其中不同的控制器可能会在同一绝对时间产生不同的凭据。 在转换间隔期间,控制器和其他设备可以基于认证功能的性质差异地使用凭证。 每个控制器可以基于自调度续订或基于来自其他设备的请求来定期更新其凭证,使得更新时间被随机延迟抵消以避免过多的网络流量。 控制器可以基于与该时间相关联的加密安全密钥以及识别与该凭证相关联的实体的信息来确定哪个凭证对于任何给定时间是有效的。
    • 66. 发明申请
    • FILE SYSTEM OPERATION AND DIGITAL RIGHTS MANAGEMENT (DRM)
    • 文件系统操作和数字权限管理(DRM)
    • US20120117662A1
    • 2012-05-10
    • US13352038
    • 2012-01-17
    • David B. CrossPaul J. Leach
    • David B. CrossPaul J. Leach
    • G06F17/30
    • G06F17/30067
    • A file system is configured for use with files protected by digital rights management (DRM) content controls and to interact both with applications that are, and are not, DRM aware. The file system may be configured for use by two applications, in a manner that may provide the second application with protected files if the first application was previously allowed access. In one example, a user context cache of DRM-protected files is created. The files in the cache may have been decrypted in response to a request(s) from the first application. Subsequent requests from the second application may be received for files within the user context cache of DRM-protected files. At least one of the files within the user context cache of DRM-protected files may be provided to the second application if the second application has a joint user context with the first application.
    • 文件系统被配置为与受数字权限管理(DRM)内容控制保护的文件一起使用,并且与DRM感知的应用程序进行交互。 文件系统可以被配置为由两个应用程序使用,其方式可以是如果第一应用程序以前被允许访问则可以向第二应用提供受保护的文件。 在一个示例中,创建DRM保护文件的用户上下文高速缓存。 响应于来自第一应用的请求,缓存中的文件可能已被解密。 可以针对受DRM保护的文件的用户上下文高速缓存中的文件接收来自第二应用的后续请求。 如果第二应用具有与第一应用的联合用户上下文,则DRM受保护文件的用户上下文高速缓存内的至少一个文件可以被提供给第二应用。
    • 67. 发明授权
    • File system operation and digital rights management (DRM)
    • 文件系统操作和数字版权管理(DRM)
    • US08117666B2
    • 2012-02-14
    • US12131884
    • 2008-06-02
    • David B. CrossPaul J. Leach
    • David B. CrossPaul J. Leach
    • H04L9/32
    • G06F17/30067
    • File system interaction with digital rights management (DRM) is facilitated by enabling one or more file system components to be DRM-aware. These one or more file system components may be part of a computer operating system. An exemplary system implementation includes: one or more processors; and one or more media in operative communication therewith, the media storing one or more file system components that are configured to provide content having DRM controls to a requesting program in either a raw form or a decrypted form in dependence on whether the DRM controls comprise simple DRM content controls or complex DRM content controls. In another exemplary system implementation, the one or more file system components are configured to provide files with simple DRM content controls to requesting applications in a decrypted form and to provide files with complex DRM content controls to requesting applications in an unaltered form.
    • 通过使一个或多个文件系统组件成为DRM感知来促进与数字版权管理(DRM)的文件系统交互。 这些一个或多个文件系统组件可以是计算机操作系统的一部分。 示例性系统实现包括:一个或多个处理器; 以及与其操作通信的一个或多个媒体,所述媒体存储一个或多个文件系统组件,其被配置为根据DRM控件是否包括简单的形式,以原始形式或解密形式向请求程序提供具有DRM控制的内容 DRM内容控件或复杂的DRM内容控件。 在另一示例性系统实现中,一个或多个文件系统组件被配置为提供具有简单DRM内容控制的文件,以解密形式来请求应用程序,并且提供具有复杂DRM内容控制的文件以以未改变形式请求应用程序。
    • 69. 发明授权
    • Policy driven, credential delegation for single sign on and secure access to network resources
    • 政策驱动,凭据授权单点登录和安全访问网络资源
    • US07913084B2
    • 2011-03-22
    • US11441588
    • 2006-05-26
    • Gennady MedvinskyCristian IlacCostin HagiuJohn E. ParsonsMohamed Emad El Din FathallaPaul J. LeachTarek Bahaa El-Din Mahmoud Kamel
    • Gennady MedvinskyCristian IlacCostin HagiuJohn E. ParsonsMohamed Emad El Din FathallaPaul J. LeachTarek Bahaa El-Din Mahmoud Kamel
    • H04L9/32
    • H04L63/0815H04L9/3273H04L63/20H04L2209/80
    • A credential security support provider (Cred SSP) is provided that enables any application to securely delegate a user's credentials from the client, via client side Security Support Provider (SSP) software, to a target server, via server side SSP software in a networked computing environment. The Cred SSP of the invention provides a secure solution that is based in part upon a set of policies, including a default policy that is secure against a broad range of attacks, which are used to control and restrict the delegation of user credentials from a client to a server. The policies can be for any type of user credentials and the different policies are designed to mitigate a broad range of attacks so that appropriate delegation can occur for given delegation circumstances, network conditions, trust levels, etc. Additionally, only a trusted subsystem, e.g., a trusted subsystem of the Local Security Authority (LSA), has access to the clear text credentials such that neither the calling application of the Cred SSP APIs on the server side nor the calling application of the Cred SSP APIs on the client side have access to clear text credentials.
    • 提供了一种凭证安全支持提供者(Cred SSP),使任何应用程序能够通过客户端安全支持提供商(SSP)软件将客户端的凭据安全地委派给目标服务器,通过网络计算中的服务器端SSP软件 环境。 本发明的Cred SSP提供了一种安全解决方案,该解决方案部分地基于一组策略,包括针对广泛的攻击的安全性的默认策略,其用于控制​​和限制从客户机委派用户凭证 到服务器。 这些策略可以用于任何类型的用户凭证,并且不同的策略被设计为减轻广泛的攻击,从而可以针对给定的授权情况,网络条件,信任级别等进行适当的委托。此外,只有可信的子系统,例如 ,本地安全机构(LSA)的受信任的子系统可以访问明文凭据,使得服务器端的Cred SSP API的呼叫应用程序和客户端的Cred SSP API的呼叫应用都不具有访问权 清除文本凭据。