会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Plugin-based user interface contributions to manage policies in an IT environment
    • 基于插件的用户界面贡献,用于管理IT环境中的策略
    • US08332758B2
    • 2012-12-11
    • US12626005
    • 2009-11-25
    • John BergeronJonathan S. KungSridhar R. MuppidiBorna SafabakhshEric J. Wood
    • John BergeronJonathan S. KungSridhar R. MuppidiBorna SafabakhshEric J. Wood
    • G06F3/00
    • G06F9/451
    • An approach is provided that registers a component plug-in with a console application. A request is received from a user of the console application. The console application displays a console user interface in a predetermined interface style. The console application detects that the request corresponds to the component plug-in and sends an initial request to the component plug-in. The console application receives an initial model of an initial user interface from the component plug-in and this model is provided to the user in response to the initial request. The console application builds an initial component user interface based on the received initial model. The initial component user interface is also consistent with the predetermined interface style. The console application displays the initial component user interface and the console user interface in a common application window in the predetermined interface style.
    • 提供了一种使用控制台应用程序注册组件插件的方法。 从控制台应用程序的用户接收到请求。 控制台应用程序以预定的界面风格显示控制台用户界面。 控制台应用程序检测到请求对应于组件插件,并向组件插件发送初始请求。 控制台应用程序从组件插件接收初始用户界面的初始模型,并且响应初始请求将该模型提供给用户。 控制台应用程序基于接收到的初始模型构建初始组件用户界面。 初始组件用户界面也与预定界面风格一致。 控制台应用程序在预定界面样式的通用应用程序窗口中显示初始组件用户界面和控制台用户界面。
    • 9. 发明授权
    • Method and system for implementing privacy policy enforcement with a privacy proxy
    • 使用隐私代理实施隐私策略执行的方法和系统
    • US07797726B2
    • 2010-09-14
    • US11014561
    • 2004-12-16
    • Paul Anthony AshleySridhar R. MuppidiMark Vandenwauver
    • Paul Anthony AshleySridhar R. MuppidiMark Vandenwauver
    • H04L9/34G06F21/00H04L9/32
    • H04L63/0407H04L63/101H04L67/306
    • A method is presented for enforcing a privacy policy concerning management of personally identifiable information in a centralized manner through a privacy proxy agent. A proxy intercepts a message from a first system to a second system, e.g., from a server to a client, and determines whether the message is associated with an operation on personally identifiable information; if not, then the proxy sends the message to the second system, but if so, then the proxy determines whether the operation on the personally identifiable information is compliant with a privacy policy and with user preference information with respect to the privacy policy for a user who is associated the personally identifiable information. If the message is compliant with the privacy policy and user preference data, then the proxy sends the first message to the second system; otherwise, an error indication is returned to the first system.
    • 提出了一种通过隐私代理代理以集中方式执行关于个人身份信息管理的隐私政策的方法。 代理拦截从第一系统到第二系统的消息,例如从服务器到客户端,并且确定消息是否与关于个人身份信息的操作相关联; 然后代理将消息发送到第二个系统,但是如果是,则代理确定关于个人身份信息的操作是否符合隐私策略以及与用户相关的隐私策略的用户偏好信息 谁联系个人身份信息。 如果消息符合隐私策略和用户偏好数据,则代理将第一消息发送到第二系统; 否则,将返回到第一系统的错误指示。
    • 10. 发明申请
    • PROPAGATING INFORMATION FROM A TRUST CHAIN PROCESSING
    • 从信任链处理传播信息
    • US20100030805A1
    • 2010-02-04
    • US12182654
    • 2008-07-30
    • Heather Maria HintonSridhar R. MuppidiDavid Eugene Cox
    • Heather Maria HintonSridhar R. MuppidiDavid Eugene Cox
    • G06F17/30H04L9/32
    • H04L63/0815G06F21/41G06F2221/2101G06F2221/2115
    • A method, system, and computer usable program product for propagating information in a trust chain processing are provided in the illustrative embodiments. Upon a trust client invoking the trust chain processing, a mapped security information is received, the mapped security information being stored in a memory or a data storage associated with a data processing system. A set of security information attributes are located from the mapped security information according to a configuration. The set of security information attributes are packaged to form a packaged security information. The packaged security information is issued to a target system, the target system being distinct from the trust client that invoked the trust chain processing. The locating, the packaging, and the issuing collectively form monitoring the trust chain processing. A next component in the trust chain processing may be invoked. The invoking may occur before, after, or during the monitoring.
    • 在说明性实施例中提供了用于在信任链处理中传播信息的方法,系统和计算机可用程序产品。 在信任客户端调用信任链处理时,接收映射的安全信息,所映射的安全信息被存储在与数据处理系统相关联的存储器或数据存储器中。 一组安全信息属性根据配置从映射的安全信息中定位。 一组安全信息属性被打包以形成打包的安全信息。 打包的安全信息被发布到目标系统,目标系统与调用信任链处理的信任客户端不同。 定位,包装和发放集体形成监督信托链处理。 可以调用信任链处理中的下一个组件。 调用可能发生在监测之前,之后或期间。