会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Automatic role activation
    • 自动角色激活
    • US09009777B2
    • 2015-04-14
    • US11565249
    • 2006-11-30
    • Saurabh DesaiNiteesh Kumar DubeyYantian Tom LuRavi A. ShankarMurali VaddagiriDrew Thomas WaltersXinya Wang
    • Saurabh DesaiNiteesh Kumar DubeyYantian Tom LuRavi A. ShankarMurali VaddagiriDrew Thomas WaltersXinya Wang
    • G06F21/00G06F21/30G06F21/62
    • G06F21/30G06F21/6218
    • A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set of roles assigned to the user is also identified. From the two sets of roles, all roles that are common to both sets are identified in a subset of roles. Roles in this subset are assigned to the user and are sufficient for the action. One or more roles from this subset of roles is selected for activation depending on system policies in effect. Selected roles are automatically activated without requiring any intervention from the user. Once the selected roles are activated, they can become inactive upon completion of the current action, or remain active for subsequent actions by the user during all or part of a user session. System policies can decide how the roles are selected for activation, and the duration of which the roles remain active once activated.
    • 提供了一种用于自动激活角色的方法,设备和计算机可用程序产品。 当用户发起一个动作时,确定该动作所需的一组角色。 还识别分配给用户的一组角色。 从两组角色中,两个集合共同的所有角色都在角色的一个子集中标识。 该子集中的角色被分配给用户,并且对于该动作是足够的。 根据有效的系统策略,选择此角色子集中的一个或多个角色进行激活。 所选角色将自动激活,无需用户干预。 一旦所选择的角色被激活,它们可以在完成当前动作时变为不活动,或者在用户会话的全部或部分期间对用户的后续动作保持活动状态。 系统策略可以决定如何激活角色,激活角色保持活动的持续时间。
    • 3. 发明申请
    • METHOD FOR AUTOMATIC ROLE ACTIVATION
    • 自动角度激活方法
    • US20080134320A1
    • 2008-06-05
    • US11565249
    • 2006-11-30
    • Saurabh DesaiNiteesh Kumar DubeyYantian Tom LuRavi A. ShankarMurali VaddagiriDrew Thomas WaltersXinya Wang
    • Saurabh DesaiNiteesh Kumar DubeyYantian Tom LuRavi A. ShankarMurali VaddagiriDrew Thomas WaltersXinya Wang
    • H04L9/32
    • G06F21/30G06F21/6218
    • A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set of roles assigned to the user is also identified. From the two sets of roles, all roles that are common to both sets are identified in a subset of roles. Roles in this subset are assigned to the user and are sufficient for the action. One or more roles from this subset of roles is selected for activation depending on system policies in effect. Selected roles are automatically activated without requiring any intervention from the user. Once the selected roles are activated, they can become inactive upon completion of the current action, or remain active for subsequent actions by the user during all or part of a user session. System policies can decide how the roles are selected for activation, and the duration of which the roles remain active once activated.
    • 提供了一种用于自动激活角色的方法,设备和计算机可用程序产品。 当用户发起一个动作时,确定该动作所需的一组角色。 还识别分配给用户的一组角色。 从两组角色中,两个集合共同的所有角色都在角色的一个子集中标识。 该子集中的角色被分配给用户,并且对于该动作是足够的。 根据有效的系统策略,选择此角色子集中的一个或多个角色进行激活。 所选角色将自动激活,无需用户干预。 一旦所选择的角色被激活,它们可以在完成当前动作时变为不活动,或者在用户会话的全部或部分期间对用户的后续动作保持活动状态。 系统策略可以决定如何激活角色,激活角色保持活动的持续时间。
    • 5. 发明授权
    • Framework for managing attributes of objects
    • 用于管理对象属性的框架
    • US07895435B2
    • 2011-02-22
    • US11751571
    • 2007-05-21
    • Saurabh DesaiNiteesh Kumar DubeyJoefon JannPratap Chandra PattnaikRavi A. ShankarMurali Vaddagiri
    • Saurabh DesaiNiteesh Kumar DubeyJoefon JannPratap Chandra PattnaikRavi A. ShankarMurali Vaddagiri
    • H04L29/06
    • G06F9/468
    • A computer implemented method, computer program product, and system for managing objects. Responsive to receiving a find-rule method, and a path-rule table, wherein the path-rule table contains a set of paths, wherein each path references an object, wherein a file system locates the object using the path, and wherein the object has at least one attribute not known to the file system, a path-rule table identifier is created. The path-rule table is associated with the path-rule table identifier to form an associated path-rule table. The find-rule method is associated with the path-rule table identifier to form an associated find-rule method. The path-rule table identifier, the associated path-rule table, and the associated find-rule method are stored. The path-rule table identifier is returned.
    • 计算机实现的方法,计算机程序产品和用于管理对象的系统。 响应于接收查找规则方法和路径规则表,其中所述路径规则表包含一组路径,其中每个路径引用对象,其中文件系统使用所述路径定位所述对象,并​​且其中所述对象 具有文件系统不知道的至少一个属性,创建路径规则表标识符。 路径规则表与路径规则表标识符相关联,以形成关联的路径规则表。 find-rule方法与路径规则表标识符相关联,以形成关联的查找规则方法。 存储路径规则表标识符,相关联的路径规则表和相关联的查找规则方法。 返回路径规则表标识符。
    • 7. 发明授权
    • Tunable encryption system
    • 可调加密系统
    • US08756429B2
    • 2014-06-17
    • US12248982
    • 2008-10-10
    • Dwip N. Banerjee, Jr.Sandeep Ramesh PatilPunadikar Sachin ChandrakantRavi A. Shankar
    • Dwip N. Banerjee, Jr.Sandeep Ramesh PatilPunadikar Sachin ChandrakantRavi A. Shankar
    • H04L29/06
    • H04L63/0428H04L63/0807H04L63/105
    • A method, programmed medium and system are provided for enabling a user to choose a user-preferred encryption type from among a plurality of encryption types listed in a user's Kerberos configuration file. During the ticket granting process in a Kerberos system, a user is requested to select a preferred encryption type to be used in the Kerberos communication from among encryption types contained in the user's Kerberos configuration file. The user-selected encryption type is then implemented for use in encrypting a session ticket (as well as generating the session key of user requested encryption type) for use by the user machine in communicating securely with an Kerberized application server when being communicated by that particular user. Thus, the system allows different users to simultaneously communicate with the same Kerberized application server using a supported encryption type of the user's own choice.
    • 提供了一种方法,编程介质和系统,用于使用户能够从用户的Kerberos配置文件中列出的多种加密类型中选择用户优选的加密类型。 在Kerberos系统中的故障单授予过程中,请求用户从用户的Kerberos配置文件中包含的加密类型中选择要在Kerberos通信中使用的首选加密类型。 用户选择的加密类型然后被实现以用于加密会话票据(以及生成用户请求的加密类型的会话密钥),以供用户机器在由特定的通信系统通信时与Kerberized应用服务器进行安全通信 用户。 因此,系统允许不同的用户使用用户自己选择的受支持的加密类型同时与相同的Kerberized应用服务器进行通信。