会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • DYNAMIC SWITCHING OF SECURITY CONFIGURATIONS
    • 动态配置的动态切换
    • US20110047589A1
    • 2011-02-24
    • US12544745
    • 2009-08-20
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00G06F9/00
    • G06F21/6209
    • Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    • 公开了一种计算机实现的方法,计算机程序产品和用于切换安全配置的装置。 数据处理系统经由执行线程访问第一安全配置,其中安全配置包括至少一个安全参数。 线程接收传入请求。 线程根据接收到的请求,切换到第二个安全配置,根据传入请求指定资源。 该线程将第二安全配置或对第二安全配置的引用存储到堆栈。 该线程基于第二安全配置来认证传入请求。 线程授予或拒绝对资源的访问。 线程执行传入请求中引用的方法。 线程恢复到第一个安全配置,响应完成该方法。
    • 2. 发明授权
    • Dynamic switching of security configurations
    • 动态切换安全配置
    • US09292702B2
    • 2016-03-22
    • US12544745
    • 2009-08-20
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00G06F21/62
    • G06F21/6209
    • Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    • 公开了一种计算机实现的方法,计算机程序产品和用于切换安全配置的装置。 数据处理系统经由执行线程访问第一安全配置,其中安全配置包括至少一个安全参数。 线程接收传入请求。 线程根据接收到的请求,切换到第二个安全配置,根据传入请求指定资源。 该线程将第二安全配置或对第二安全配置的引用存储到堆栈。 该线程基于第二安全配置来认证传入请求。 线程授予或拒绝对资源的访问。 线程执行传入请求中引用的方法。 线程恢复到第一个安全配置,响应完成该方法。
    • 3. 发明授权
    • Flexibly assigning security configurations to applications
    • 灵活地将安全配置分配给应用程序
    • US08522307B2
    • 2013-08-27
    • US13413631
    • 2012-03-06
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • H04L9/00H04L9/32
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 4. 发明申请
    • FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    • 灵活地将安全配置分配给应用程序
    • US20120198515A1
    • 2012-08-02
    • US13413631
    • 2012-03-06
    • PAUL W. BENNETTElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • PAUL W. BENNETTElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 5. 发明授权
    • Flexibly assigning security configurations to applications
    • 灵活地将安全配置分配给应用程序
    • US08230478B2
    • 2012-07-24
    • US12548767
    • 2009-08-27
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • H04L9/00H04L9/32
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 6. 发明申请
    • FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    • 灵活地将安全配置分配给应用程序
    • US20110055926A1
    • 2011-03-03
    • US12548767
    • 2009-08-27
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 10. 发明授权
    • Inferring static traffic artifact presence, location, and specifics from aggregated navigation system data
    • 从汇总的导航系统数据中推导出静态交通工件的存在,位置和细节
    • US07519472B1
    • 2009-04-14
    • US12120883
    • 2008-05-15
    • Travis M. GrigsbySteven M. MillerDaniel E. MorrisLisa A. Seacat
    • Travis M. GrigsbySteven M. MillerDaniel E. MorrisLisa A. Seacat
    • G01C21/00G06F19/00G08G1/123
    • G08G1/127G01C21/32G08G1/0112G08G1/0129
    • Aggregated navigation system data can be used by an artifact repository to infer the presence of a static traffic artifact. Static traffic artifact can include traffic lights, traffic signs, special traffic zones, railroad crossings, and the like. Metric data collected from multiple global positioning systems (GPS) devices can provide sampling data for inferring a static traffic artifact on a road. Metrics can include driving behavior, travel direction, velocity, timestamps, delay, and the like. For example, if thirty percent of the data collected about an intersection indicates drivers come to a stop at an intersection, the system can infer a traffic light exists at the intersection. Each traffic artifact can have an associated confidence factor which can indicate the degree of accuracy of the inferred artifact. Confidence factor can be increased or decreased based on the re-evaluation of sample data for the artifact.
    • 聚合导航系统数据可由工件存储库使用,以推断静态流量假象的存在。 静态交通工具可以包括交通灯,交通标志,特殊交通区域,铁路交叉路口等。 从多个全球定位系统(GPS)设备收集的公制数据可以提供采样数据,以推断道路上的静态交通工件。 指标可以包括驾驶行为,旅行方向,速度,时间戳,延迟等。 例如,如果收集的关于交叉路口的数据的百分之三十表示司机在十字路口停下来,系统可以推断交叉点处存在交通信号灯。 每个交通工具可以具有相关的置信因子,其可以指示推断的神器的准确度。 可以根据人造物样本数据的重新评估来增加或减少置信度。