会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Providing travel log integration for objects hosted in a browser
    • 为浏览器中托管的对象提供旅游日志集成
    • US07430739B2
    • 2008-09-30
    • US11117766
    • 2005-04-27
    • Kusuma P. VellankiSujal S. ParikhLauren B. LavoieShankar Ganesh
    • Kusuma P. VellankiSujal S. ParikhLauren B. LavoieShankar Ganesh
    • G06F9/46G06F15/16
    • G06F17/30899
    • Described is a method and system by which document servers/applications (document objects) hosted by the browser may integrate with the browser's travel log. As a result, the user can use browser navigation commands, particularly forward and back commands, as well as a drop-down list of entries, to navigate among a hosted document's pages. Integration also allows the document object to add travel entries, persist relevant state, delete travel entries and update existing travel entries with new state. The browser and document object may communicate to update the browser's address bar, and to communicate various navigation events to keep each other synchronized. In one implementation, the browser limits navigation to top-level travel entries and the sub-navigation entries of the currently hosted document object, by filtering out sub-navigation entries that do not correspond to the currently-hosted document object. Frames no longer valid are also filtered from those available for navigation.
    • 描述了由浏览器托管的文档服务器/应用(文档对象)可以与浏览器的旅行日志集成的方法和系统。 因此,用户可以使用浏览器导航命令,特别是前进和后退命令,以及条目的下拉列表,以便在托管文档的页面之间导航。 集成还允许文档对象添加旅行条目,持续相关状态,删除旅行条目,并更新具有新状态的现有旅行条目。 浏览器和文档对象可以通信以更新浏览器的地址栏,并且传达各种导航事件以保持彼此同步。 在一个实现中,浏览器通过过滤与当前托管的文档对象不对应的子导航条目来限制到顶级旅行条目的导航和当前托管的文档对象的子导航条目。 不再有效的帧也可以从可用于导航的帧中过滤掉。
    • 5. 发明申请
    • System and method for zone transition mitigation with relation to a network browser
    • 与网络浏览器相关的区域过渡缓解系统和方法
    • US20050246772A1
    • 2005-11-03
    • US10835909
    • 2004-04-30
    • Shankar GaneshRoberto FrancoKurt Schmucker
    • Shankar GaneshRoberto FrancoKurt Schmucker
    • G06F21/00H04L9/00H04L29/06
    • H04L63/168G06F21/53G06F21/6218H04L63/105
    • A method and system for determining whether to allow a network browser action when a transition occurs between security zones as a result of the action is provided. Gaining access to a local machine zone may be a goal for unauthorized entities attempting to improperly access a user's content. The present invention therefore may be initiated to block transitions from the security zones with stricter security restrictions to zones with less security restrictions. In addition, a selected alternative may be commenced depending on the relative weight of the security zones involved the zone transition. Depending on the relative weight of security zones, the transition between zones may be allowed, prevented, or the user may be prompted to decide whether to allow or prevent the action that results in the zone transition.
    • 提供了一种用于在作为结果的安全区之间发生转换时确定是否允许网络浏览器动作的方法和系统。 访问本地计算机区域可能是未经授权的实体尝试不正确访问用户内容的目标。 因此,本发明可以被启动以阻止具有更严格的安全限制的安全区域到具有较少安全限制的区域的转换。 此外,可以根据涉及区域转换的安全区域的相对权重来开始选择的替代方案。 根据安全区域的相对权重,可以允许,防止区域之间的过渡,或者可能会提示用户决定是否允许或阻止导致区域转换的动作。
    • 7. 发明申请
    • Providing travel log integration for objects hosted in a browser
    • 为浏览器中托管的对象提供旅游日志集成
    • US20060248444A1
    • 2006-11-02
    • US11117766
    • 2005-04-27
    • Kusuma VellankiSujal ParikhLauren LavoieShankar Ganesh
    • Kusuma VellankiSujal ParikhLauren LavoieShankar Ganesh
    • G06F17/00
    • G06F17/30899
    • Described is a method and system by which document servers/applications (document objects) hosted by the browser may integrate with the browser's travel log. As a result, the user can use browser navigation commands, particularly forward and back commands, as well as a drop-down list of entries, to navigate among a hosted document's pages. Integration also allows the document object to add travel entries, persist relevant state, delete travel entries and update existing travel entries with new state. The browser and document object may communicate to update the browser's address bar, and to communicate various navigation events to keep each other synchronized. In one implementation, the browser limits navigation to top-level travel entries and the sub-navigation entries of the currently hosted document object, by filtering out sub-navigation entries that do not correspond to the currently-hosted document object. Frames no longer valid are also filtered from those available for navigation.
    • 描述了由浏览器托管的文档服务器/应用(文档对象)可以与浏览器的旅行日志集成的方法和系统。 因此,用户可以使用浏览器导航命令,特别是前进和后退命令,以及条目的下拉列表,以便在托管文档的页面之间导航。 集成还允许文档对象添加旅行条目,持续相关状态,删除旅行条目,并更新具有新状态的现有旅行条目。 浏览器和文档对象可以通信以更新浏览器的地址栏,并且传达各种导航事件以保持彼此同步。 在一个实现中,浏览器通过过滤与当前托管的文档对象不对应的子导航条目来限制到顶级旅行条目的导航和当前托管的文档对象的子导航条目。 不再有效的帧也可以从可用于导航的帧中过滤掉。
    • 10. 发明申请
    • SECURITY RESTRICTIONS ON BINARY BEHAVIORS
    • 二级行为的安全限制
    • US20100257615A1
    • 2010-10-07
    • US12777565
    • 2010-05-11
    • Shankar GaneshJohn G. Bedworth
    • Shankar GaneshJohn G. Bedworth
    • G06F21/00
    • H04L63/105
    • A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    • 安全模型基于识别的安全区域限制机器上的二进制行为。 二进制行为可以附加到文档,网页或电子邮件的元素。 二进制行为可能威胁到本地机器上的安全性。 安全管理员拦截下载请求和/或执行请求,识别所请求的二进制行为的安全区域,并限制基于安全区域的访问。 二进制行为可以根据相关URL识别安全区域。 在一个示例中,与安全区域相关联的所有二进制行为被相同地处理。 在另一个示例中,允许的二进制行为的列表与安全区域相关联,使得仅允许指定的二进制行为被访问。 在另一个示例中,不允许的二进制行为的列表与安全区域相关联,使得在列表中找到的二进制行为不能启动访问。