会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Access control policy in a weakly-coherent distributed collection
    • 访问控制策略在弱连贯的分布式集合中
    • US08505065B2
    • 2013-08-06
    • US11765886
    • 2007-06-20
    • Edward P. WobberMartin AbadiThomas L. Rodeheffer
    • Edward P. WobberMartin AbadiThomas L. Rodeheffer
    • G06F17/00H04L29/06
    • G06F17/30578H04L9/12H04L9/321H04L9/3268H04L2209/60H04L2209/80
    • A system is disclosed for creating and implementing an access control policy framework in a weakly coherent distributed collection. A collection manager may sign certificates forming equivalence classes of replicas that share a specific authority. The collection manager and/or certain privileged replicas may issue certificates that delegate authority for control of item policy and replica policy. Further certificates may be signed that create one or more items, set policy for these one or more items, and define a set of operations authorized on the one or more items. The certificates issued according to the present system for creating and implementing a control policy framework cannot be modified or simply overridden. Once a policy certificate is issued, it may only be revoked by the collection manager or by a replica having revocation authority.
    • 公开了一种用于在弱相关分布式集合中创建和实现访问控制策略框架的系统。 收集管理员可以签署形成共享特定权限的副本的等价类的证书。 收集管理员和/或某些特权副本可能会颁发授权来管理项目策略和副本策略的证书。 可以签署创建一个或多个项目的其他证书,为这些一个或多个项目设置策略,并且定义一个或多个项目授权的一组操作。 根据本制度制定的颁发和实施控制政策框架的证书不能修改或简单地覆盖。 颁发政策证书后,只能由收款经理或具有撤销授权的副本撤销。
    • 2. 发明申请
    • ACCESS CONTROL POLICY IN A WEAKLY-COHERENT DISTRIBUTED COLLECTION
    • 弱智分布式收集中的访问控制策略
    • US20080320299A1
    • 2008-12-25
    • US11765886
    • 2007-06-20
    • Edward P. WobberMartin AbadiThomas L. Rodeheffer
    • Edward P. WobberMartin AbadiThomas L. Rodeheffer
    • H04L9/00
    • G06F17/30578H04L9/12H04L9/321H04L9/3268H04L2209/60H04L2209/80
    • A system is disclosed for creating and implementing an access control policy framework in a weakly coherent distributed collection. A collection manager may sign certificates forming equivalence classes of replicas that share a specific authority. The collection manager and/or certain privileged replicas may issue certificates that delegate authority for control of item policy and replica policy. Further certificates may be signed that create one or more items, set policy for these one or more items, and define a set of operations authorized on the one or more items. The certificates issued according to the present system for creating and implementing a control policy framework cannot be modified or simply overridden. Once a policy certificate is issued, it may only be revoked by the collection manager or by a replica having revocation authority.
    • 公开了一种用于在弱相关分布式集合中创建和实现访问控制策略框架的系统。 收集管理员可以签署形成共享特定权限的副本的等价类的证书。 收集管理员和/或某些特权副本可能会颁发授权来管理项目策略和副本策略的证书。 可以签署创建一个或多个项目的其他证书,为这些一个或多个项目设置策略,并且定义在一个或多个项目上授权的一组操作。 根据本制度制定的颁发和实施控制政策框架的证书不能修改或简单地覆盖。 颁发政策证书后,只能由收款经理或具有撤销授权的副本撤销。
    • 8. 发明授权
    • Memory bound functions for spam deterrence and the like
    • 用于垃圾邮件威慑的内存绑定功能等
    • US07149801B2
    • 2006-12-12
    • US10290879
    • 2002-11-08
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • G06F15/173H04K1/00
    • H04L63/126H04L51/12
    • A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    • 如果用户投入很少或没有成本,资源可能会被滥用。 例如,电子邮件滥用是猖獗的,因为发送电子邮件对发件人的成本可以忽略不计。 通过以中等昂贵的计算的形式引入人造成本,可能不鼓励这种滥用。 因此,电子邮件的发件人可能需要在电子邮件被接受之前几秒计算才能付款。 不幸的是,由于计算机系统之间的差异很大,对于具有高端系统的恶意用户来说,这种方法可能无效,对于具有低端系统的合法用户或者两者都是非常缓慢的。 从这个观察开始,我们确定了最近的计算机系统以相同的速度评估的适度硬的记忆绑定功能,我们解释如何使用它们来防止滥用。
    • 10. 发明申请
    • ACCESS CONTROL BASED ON PROGRAM PROPERTIES
    • 基于程序属性的访问控制
    • US20080282354A1
    • 2008-11-13
    • US11745048
    • 2007-05-07
    • Edward P. WobberAndrew BirrellMartin Abadi
    • Edward P. WobberAndrew BirrellMartin Abadi
    • H04L9/00
    • H04L63/101G06F21/6218
    • A pattern matching access control system determines whether a principal should be granted access to use a resource based on properties of applications comprised by the principal. The principal name may be created when an application is loaded, invokes other applications (or programs) and/or assumes a new role context. Access is provided based on whether, for each application, the publisher is authorized by system policy to grant privilege as requested by the application. When a resource which requires the privilege is requested by a principal, an access control list (ACL) for the resource is expanded with a list of applications that have been authorized through their publisher to assert the privilege. The expanded ACL is compared to the principal name to determine resource access.
    • 模式匹配访问控制系统基于主体的应用程序的属性确定是否应授予主体访问权限以使用资源。 可以在应用程序加载时调用主体名称,调用其他应用程序(或程序)和/或假定新的角色上下文。 访问是基于每个应用程序,发布者是否被系统策略授权以根据应用程序请求授予特权来提供访问。 当一个委托人请求一个需要该权限的资源时,该资源的访问控制列表(ACL)会被扩展,并通过其发布者授权的应用程序列表来声明该权限。 将扩展的ACL与主体名称进行比较以确定资源访问。