会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Automated deployment of an application
    • 自动部署应用程序
    • US20050289536A1
    • 2005-12-29
    • US10874495
    • 2004-06-23
    • Ranjit NayakSridhar SudarsanVishwanath VenkataramappaQinhua WangLeigh Williamson
    • Ranjit NayakSridhar SudarsanVishwanath VenkataramappaQinhua WangLeigh Williamson
    • G06F9/44G06F9/445
    • G06F8/61
    • Methods, systems, and media to automatically deploy an, e.g., a JS2EE file between environments are disclosed. Embodiments include hardware and/or software for selecting one or more applications in an original system for export. The applications along with their corresponding application data, configuration data, and descriptor files, are compressed into one or more archive files such as Enterprise Archives (EARs). Variable configuration data associated with the target environment is identified so the values of the variable configuration data can be adapted for the target environment. Then, the target environment is adapted for installation of the application and the application is installed in the target environment. Advantageously, this deployment of the application may reduce the chance of user error, require less J2EE knowledge and script maintenance, and complete faster than deployments effected manually.
    • 公开了在环境之间自动部署例如JS2EE文件的方法,系统和媒体。 实施例包括用于选择用于输出的原始系统中的一个或多个应用的​​硬件和/或软件。 应用程序及其相应的应用程序数据,配置数据和描述符文件被压缩成一个或多个存档文件,例如企业档案(EAR)。 识别与目标环境相关联的可变配置数据,从而可以针对目标环境调整可变配置数据的值。 然后,目标环境适用于安装应用程序,应用程序安装在目标环境中。 有利地,应用程序的这种部署可能减少用户错误的机会,需要较少的J2EE知识和脚本维护,并且比手动实现的部署更快地完成。
    • 2. 发明申请
    • Metadata driven method and apparatus to configure heterogenous distributed systems
    • 配置异构分布式系统的元数据驱动方法和装置
    • US20060123016A1
    • 2006-06-08
    • US11002696
    • 2004-12-02
    • Rohith AshokMichael ChengVishwanath VenkataramappaQinhua Wang
    • Rohith AshokMichael ChengVishwanath VenkataramappaQinhua Wang
    • G06F7/00
    • H04L41/0803G06F16/256H04L41/0869H04L41/0893
    • A meta-data driven method and apparatus to manage configurations of coexisting heterogeneous subsystems. The present invention recognizes that schemas evolve incrementally from version to version. In a preferred embodiment, the present invention employs two stages: an identification specification stage, to identify and/or specify any changes in a heterogeneous distributed system, and a configuration validation stage, to implement and/or validate the changes thus identified or specified. In the first stage, the identification specification stage, the present invention programmably compares the next version of the schema from its previous version. This allows meta-data to be created that describes how a schema component evolves from version to version. In addition, a user may specify what appears in the schema. In the second stage, the configuration validation stage, the meta-data created in the first stage can be used to determine whether a particular component version of the subsystem is valid for a particular schema component, and vice versa, and/or to configure the subsystem to conform to the schema.
    • 一种用于管理并存异构子系统配置的元数据驱动方法和装置。 本发明认识到,模式从版本到版本逐渐发展。 在优选实施例中,本发明采用两个阶段:标识规范阶段,用于识别和/或指定异构分布式系统中的任何变化以及配置验证阶段,以实现和/或验证由此识别或指定的变化。 在第一阶段中,识别规范阶段,本发明可编程地比较其先前版本的下一版本的模式。 这允许创建描述模式组件从版本到版本的元数据。 此外,用户可以指定模式中显示的内容。 在第二阶段,配置验证阶段,在第一阶段创建的元数据可用于确定子系统的特定组件版本是否对特定模式组件有效,反之亦然,和/或配置 子系统符合模式。
    • 3. 发明申请
    • Fine-grained authorization by authorization table associated with a resource
    • 与资源关联的授权表进行细粒度授权
    • US20050132220A1
    • 2005-06-16
    • US10732628
    • 2003-12-10
    • David ChangVishwanath VenkataramappaLeigh Williamson
    • David ChangVishwanath VenkataramappaLeigh Williamson
    • G06F21/00H04L9/00H04L29/06
    • H04L63/101G06F21/6218
    • Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource. Further, the embodiment includes locating, based on the request, the resource in a structure having groupings of resources, wherein the groupings include a grouping having the resource. Typically the groupings comprise files having mappings of resources to assigned groups, and each group has an associated authorization table mapping roles or policies to users. Further still, the embodiment includes reading an authorization table associated with the grouping having the resource, and determining whether to grant the access rights for performing the action on the resource.
    • 公开了用于确定对由应用程序管理的资源的访问权限的方法,系统和媒体。 一个实施例包括接收应用的请求,其中所述请求包括用户寻求对资源执行的动作。 此外,实施例包括基于请求定位具有资源分组的结构中的资源,其中分组包括具有资源的分组。 通常,分组包括具有分配组的资源映射的文件,并且每个组具有将角色或策略映射到用户的相关联的授权表。 此外,实施例包括读取与具有资源的分组相关联的授权表,以及确定是否授予对资源执行动作的访问权限。
    • 4. 发明申请
    • Fine-grained authorization by traversing generational relationships
    • 遍历代际关系的细粒度授权
    • US20050132054A1
    • 2005-06-16
    • US10732627
    • 2003-12-10
    • David ChangVishwanath VenkataramappaLeigh Williamson
    • David ChangVishwanath VenkataramappaLeigh Williamson
    • G06F15/16G06F21/00
    • G06F21/6218
    • Methods, systems, and media are disclosed for determining access rights to a resource managed by an application. One embodiment includes receiving a request by the application, wherein the request comprises an action a user seeks to perform on the resource, and locating, based on the request, the resource in both a containment relationship graph and in a structure having groupings of resources, wherein the groupings comprise a grouping having the resource. Further, the embodiment includes traversing a vertex of the containment relationship graph, wherein the vertex comprises a generational resource of the resource, and reading an authorization table associated with a grouping having the generational resource in the groupings. Further still, the embodiment includes determining whether to grant the access rights for performing the action on the resource.
    • 公开了用于确定对由应用程序管理的资源的访问权限的方法,系统和媒体。 一个实施例包括接收应用的请求,其中所述请求包括用户在资源上执行的动作,以及基于请求,在包含关系图和具有资源分组的结构中定位资源, 其中所述分组包括具有所述资源的分组。 此外,实施例包括遍历包容关系图的顶点,其中顶点包括资源的代数资源,以及读取与分组中具有代数资源的分组相关联的授权表。 此外,该实施例还包括确定是否授予对资源执行动作的访问权限。
    • 5. 发明申请
    • Fine-grained authorization using mbeans
    • 使用mbeans的细粒度授权
    • US20050131994A1
    • 2005-06-16
    • US10732756
    • 2003-12-10
    • David ChangVishwanath VenkataramappaLeigh Williamson
    • David ChangVishwanath VenkataramappaLeigh Williamson
    • G06F15/16G06F21/00H04L29/06
    • G06F21/6218G06F21/6209H04L63/0227H04L63/083H04L63/10Y10S707/99943
    • Methods, systems, and media are disclosed for managing a resource managed by a mbean server having an mbean. One embodiment includes receiving a request by the application, wherein the request constitutes an action a user seeks to perform on the resource, and adding a number of instance identifier fields to an mbean descriptor file associated with the mbean. Further, the embodiment includes populating the number of instance identifier fields with an equivalent number of properties from an objectname of the resource, thereby producing a populated mbean descriptor file that identifies the resource among resources. Further still, the embodiment includes reading the mbean descriptor file after the populating, and determining, based on the reading, whether the user has an authority to perform the request. If authority exists, then an mbean method performs the action on the resource, and filters the obtained results to coincide with the user's authority.
    • 公开了用于管理由具有mbean的mbean服务器管理的资源的方法,系统和媒体。 一个实施例包括接收应用程序的请求,其中该请求构成用户寻求对该资源执行的动作,并将多个实例标识符字段添加到与该mbean相关联的mbean描述符文件。 此外,该实施例包括从资源的对象名称填充具有等效数量的属性的实例标识符字段的数量,由此产生在资源之间标识资源的填充的mbean描述符文件。 此外,实施例包括在填充之后读取mbean描述符文件,并且基于读取来确定用户是否具有执行请求的权限。 如果权限存在,则mbean方法对资源执行操作,并对获取的结果进行过滤,以符合用户权限。
    • 6. 发明授权
    • Automatic wireless network password update
    • 自动无线网络密码更新
    • US08290163B2
    • 2012-10-16
    • US12049294
    • 2008-03-15
    • David Yu ChangJohn Yow-Chun ChangVishwanath Venkataramappa
    • David Yu ChangJohn Yow-Chun ChangVishwanath Venkataramappa
    • H04L29/06
    • H04L63/0846H04L63/0428H04W12/02H04W12/06
    • An approach is provided that allows an administrator to set a new password at a wireless access point, such as a traditional WAP or a wireless router. The wireless access point creates a message that includes the new password. The message is encrypted using the old password that was previously set for the wireless network. The encrypted message is wirelessly transmitted from the wireless access point to the active client devices (those clients currently accessing the wireless network). The clients decrypt the message using the old password that was previously provided to the clients. The clients retrieve the new password from the message. The clients construct a new message that is encrypted using the new password. The new message is wirelessly transmitted from the clients to the wireless access device and serves as an acknowledgement.
    • 提供了一种允许管理员在无线接入点(例如传统WAP或无线路由器)设置新密码的方法。 无线接入点创建一个包含新密码的消息。 该消息是使用之前为无线网络设置的旧密码加密的。 加密的消息从无线接入点无线地发送到活动客户端设备(当前正在接入无线网络的那些客户端)。 客户端使用之前提供给客户端的旧密码解密邮件。 客户端从邮件中检索新密码。 客户端构造使用新密码加密的新消息。 新消息从客户端无线传输到无线接入设备,并作为确认。
    • 7. 发明申请
    • Method and system for dynamic client authentication in support of JAAS programming model
    • 支持JAAS编程模型的动态客户端认证的方法和系统
    • US20050005090A1
    • 2005-01-06
    • US10611022
    • 2003-07-01
    • Vishwanath VenkataramappaShyamala Vishwanath
    • Vishwanath VenkataramappaShyamala Vishwanath
    • H04L9/00
    • G06F21/31G06F9/468G06F21/335G06F2221/2149
    • Authentication operations are performed within a CORBA-compliant environment with client applications using the JAAS programming model. A client application obtains an interoperable object reference (IOR) for a target object on a remote server that is protected within a security domain. After the client application invokes the target object, an object request is generated, and a request-level interceptor obtains the IOR for the target object and extracts an identifier for the security domain from the IOR. If a credential for the security domain is not in the current execution context of the client application, i.e., the current JAAS subject in the JAAS programming model, then the request-level interceptor performs an authentication operation with the security domain on behalf of the client application, receives an authentication credential, and places the authentication credential into the execution context of the client application. The object request is further processed in association with the obtained credential.
    • 使用JAAS编程模型的客户端应用程序在符合CORBA的环境中执行身份验证操作。 客户端应用程序获取在安全域内受保护的远程服务器上的目标对象的可互操作对象引用(IOR)。 客户端应用程序调用目标对象后,生成对象请求,请求级拦截器获取目标对象的IOR,并从IOR中提取安全域的标识符。 如果安全域的凭证不在客户端应用程序的当前执行上下文中,即JAAS编程模型中的当前JAAS主题,则请求级拦截器代表客户机与安全域执行身份验证操作 应用程序,接收认证凭证,并将认证凭证放入客户端应用程序的执行上下文中。 与所获得的证书相关联地进一步处理对象请求。
    • 8. 发明申请
    • Authentication and authorization methods for cloud computing security platform
    • 云计算安全平台的认证和授权方法
    • US20130007845A1
    • 2013-01-03
    • US13173563
    • 2011-06-30
    • David Yu ChangMessaoud BenantarJohn Yow-Chun ChangVishwanath Venkataramappa
    • David Yu ChangMessaoud BenantarJohn Yow-Chun ChangVishwanath Venkataramappa
    • G06F17/30
    • H04L63/104G06F21/62G06F21/6218G06F21/78G06F2221/2115H04L63/08H04L63/0815H04L67/10H04L67/34H04L67/42
    • An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
    • 云计算环境的认证和授权插件模型使云客户在将应用程序部署在云中时能够保留对其企业信息的控制。 云服务提供商为客户安全模块提供可插拔的界面。 当客户部署应用程序时,云环境管理员为客户的应用程序和数据分配资源组(例如,处理器,存储和内存)。 客户将其自己的认证和授权安全模块注册到云安全服务,然后该安全模块用于控制哪些人员或实体可以访问与部署的应用程序相关的信息。 然而,云环境管理员通常没有在客户的安全模块中注册(作为允许的用户); 因此,云环境管理员无法访问(或向其他人或云的一般资源池)访问分配给云客户的资源(即使管理员自己分配了这些资源)或相关联的业务信息。 为了进一步平衡各方的权利,第三方公证服务在将应用程序和信息部署在云中时保护客户的隐私和访问权限。