会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • CLOUD SCALE DIRECTORY SERVICES
    • 云计算目录服务
    • US20110145526A1
    • 2011-06-16
    • US12635028
    • 2009-12-10
    • Jeffrey Bruce ParhamBhalchandra PanditMark Robbin BrownMurli Satagopan
    • Jeffrey Bruce ParhamBhalchandra PanditMark Robbin BrownMurli Satagopan
    • G06F12/16
    • G06F3/0619G06F3/061G06F3/0644G06F3/065G06F3/067G06F3/0683G06F17/30575
    • Embodiments described herein are directed to providing scalability to software applications. A computer system partitions a portion of data stored in a directory services system into multiple different data partitions. Each data partition includes a primary writable copy and at least one secondary read-only copy of the data. The computer system receives a client request for a portion of the data that is stored in the directory services system and accesses various stored partition mappings to determine which of the different data partitions includes the requested data. The computer system also accesses a dynamic copy locator to determine which of the read-only copies of the indicated partition to access and provide the accessed primary writeable copy of the indicated partition and the determined read-only copy to the client in a virtualized manner so that the client is not aware of the data partitions.
    • 本文描述的实施例旨在提供对软件应用的可扩展性。 计算机系统将存储在目录服务系统中的数据的一部分分成多个不同的数据分区。 每个数据分区包括主要可写入副本和数据的至少一个次要只读副本。 计算机系统接收对存储在目录服务系统中的一部分数据的客户端请求,并访问各种存储的分区映射,以确定哪个不同的数据分区包括所请求的数据。 计算机系统还访问动态复制定位器,以确定指定分区的哪些只读副本访问,并以虚拟化的方式将指定分区和所确定的只读副本的访问主可写副本提供给客户端 客户端不知道数据分区。
    • 5. 发明申请
    • Method and system for identity exchange and recognition
    • 身份认同方法和系统
    • US20050091495A1
    • 2005-04-28
    • US10693172
    • 2003-10-23
    • Kim CameronArun NandaDon HacherlMurli SatagopanStuart KwanColin BraceWalter SmithMelissa Dunn
    • Kim CameronArun NandaDon HacherlMurli SatagopanStuart KwanColin BraceWalter SmithMelissa Dunn
    • G06F20060101G06F13/00G06F17/00G06F19/00G06F21/00G06K20060101H04L9/00H04L9/32H04L29/06
    • H04L63/102G06F21/31G06F21/64H04L63/126
    • In accordance with various aspects, the present invention relates to methods and systems for sending an identity information document comprising selecting identity information from a self-identity information store for inclusion in the identity information document. The selected identity information is read from a self-identity information store. The identity information document is generated to include the selected identity information and one or more keys, and signed using a key associated with one of the keys included in the identity information document. The identity information document is then sent to a recipient. Receiving an identity information document comprises receiving a signed identity information document from an originator. A determination is made as to whether identity information in the identity information document is reliable. The identity information is saved in a recognized identity information store if the identity information is determined to be reliable. If the identity information is determined to be unreliable, an identity recognition number retrieved from the sender is compared to an identity recognition number generated by the recipient based on information in the received identity information document. If the identity recognition number is verified, the identity information is saved in the recognized identity information store.
    • 根据各方面,本发明涉及用于发送身份信息文档的方法和系统,包括从自身身份信息存储中选择身份信息以包括在身份信息文档中。 所选择的身份信息从自身身份信息存储器读取。 生成身份信息文档以包括所选择的身份信息和一个或多个密钥,并且使用与包括在身份信息文档中的密钥之一相关联的密钥进行签名。 然后将身份信息文档发送给收件人。 接收身份信息文档包括从发起者接收签名的身份信息文档。 确定身份信息文档中的身份信息是否可靠。 如果身份信息被确定为可靠,则身份信息被保存在识别的身份信息存储器中。 如果身份信息被确定为不可靠,则根据接收到的身份信息文档中的信息,将从发送者检索到的身份识别号码与由接收者产生的身份识别号码进行比较。 如果身份识别号码被验证,身份信息被保存在识别的身份信息存储中。
    • 6. 发明授权
    • System and method for name resolution
    • 名称解析的系统和方法
    • US08473634B2
    • 2013-06-25
    • US10693516
    • 2003-10-23
    • Murli SatagopanKim Cameron
    • Murli SatagopanKim Cameron
    • H04L29/12066
    • H04L63/102G06F17/3089H04L29/12122H04L29/12896H04L61/1547H04L61/307H04L61/605H04L67/02H04L67/104H04L67/1061H04L69/329
    • In accordance with various aspects, the present invention relates to accessing and publishing documents between two computer systems or nodes that are connected together in a network environment. The system and method for name resolution stores an identity information document containing a user-friendly handle signifying identity, such as an email address, and a machine location, such as an IP address, for the publishing computer system where the documents are stored. Next, the system and method intercepts an initial request for access to documents when the initial request includes a user-friendly handle and replaces the user-friendly handle with the machine location, so that network users may easily access these documents through knowledge only of the user-friendly handle.
    • 根据各方面,本发明涉及在网络环境中连接在一起的两个计算机系统或节点之间访问和发布文档。 用于名称解析的系统和方法存储包含用户友好句柄表示身份的身份信息文档,例如电子邮件地址,以及用于存储文档的发布计算机系统的诸如IP地址的机器位置。 接下来,当初始请求包括用户友好的句柄并且将用户友好的句柄替换为机器位置时,系统和方法拦截对文档的访问的初始请求,使得网络用户可以通过仅知道 用户友好的句柄。
    • 8. 发明申请
    • Authentication and Authorization Across Autonomous Network Systems
    • 跨自治网络系统的认证和授权
    • US20060184646A1
    • 2006-08-17
    • US11379998
    • 2006-04-24
    • Donald SchmidtClifford Van DykePaul LeachPraerit GargMurli Satagopan
    • Donald SchmidtClifford Van DykePaul LeachPraerit GargMurli Satagopan
    • G06F15/16
    • H04L63/0815H04L63/083
    • An enterprise network architecture has a trust link established between two autonomous network systems that enables transitive resource access between network domains of the two network systems. The trust link is defined by data structures maintained by each of the respective network systems. The first network system maintains namespaces that correspond to the second network system and a domain controller in the first network system, or a first network system administrator, indicates whether to trust individual namespaces. An account managed by a domain in the second network system can request authentication via a domain controller in the first network system. The first network system determines from the trust link to communicate the authentication request to the second network system. The first network system also determines from the trust link where to communicate authorization requests when administrators manage group memberships and access control lists.
    • 企业网络架构具有建立在两个自主网络系统之间的信任链路,能够实现两个网络系统的网络域之间的传递资源访问。 信任链接由相应网络系统中的每一个维护的数据结构来定义。 第一网络系统维护对应于第二网络系统的命名空间和第一网络系统中的域控制器,或者第一网络系统管理员指示是否信任个体命名空间。 由第二网络系统中的域管理的帐户可以通过第一网络系统中的域控制器请求认证。 第一网络系统从信任链路确定将认证请求传送到第二网络系统。 当管理员管理组成员身份和访问控制列表时,第一个网络系统还从信任链接确定何处传达授权请求。