会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Group policy framework
    • 集团政策框架
    • US08935365B1
    • 2015-01-13
    • US12381671
    • 2009-03-13
    • Joseph LevinDanny Kim
    • Joseph LevinDanny Kim
    • G06F15/16
    • G06F21/604
    • In an embodiment, a method includes configuring policy settings, storing the configured policy settings in a common document format and consuming the common document format to implement the configured policy settings. Policy settings are stored in a settings document having a common document format that defines how to implement policy operations on the policy settings, the policy operations including configuration, application, analysis, reporting and auditing. The settings document is processed to implement any of the policy operations.
    • 在一个实施例中,一种方法包括配置策略设置,将配置的策略设置存储在通用文档格式中,并消耗公共文档格式以实现配置的策略设置。 策略设置存储在具有通用文档格式的设置文档中,该文档格式定义了如何在策略设置(包括配置,应用程序,分析,报告和审核)上执行策略操作。 处理设置文档以执行任何策略操作。
    • 8. 发明申请
    • Managing Policy Settings for Remote Clients
    • 管理远程客户端的策略设置
    • US20080104661A1
    • 2008-05-01
    • US11680924
    • 2007-03-01
    • Joseph LevinDanny Kim
    • Joseph LevinDanny Kim
    • H04L9/00
    • G06F21/6218
    • A method for managing group policy settings at a client computer system includes storing group policy settings in a local policy cache of the client computer system and applying the group policy settings from the local policy cache to the client computer system. The group policy settings may be acquired from a policy portal over a network connection and the local policy cache of the client computer system updated with the acquired group policy settings. A policy portal may be queried over a network connection to determine an age of group policy settings stored at the policy portal. If the group policy settings in the local policy cache are older than the group policy settings stored at the policy portal, the group policy settings are acquired from the policy portal for updating the local policy cache. If the local policy cache does not contain group policy settings, group policy settings may be acquired from a policy portal for updating the local policy cache. A method for managing group policy settings on one or more client computer systems includes receiving a request for group policy settings from a client computer system over a network and sending group policy settings to the client computer system in response to the client request. A domain associated with the client computer system is determined and group policy settings are requested from a domain controller corresponding to the determined domain. The group policy settings associated with the client computer system may be retrieved from a policy settings database.
    • 用于在客户端计算机系统处管理组策略设置的方法包括将组策略设置存储在客户端计算机系统的本地策略高速缓存中,并将组策略设置从本地策略高速缓存应用到客户端计算机系统。 可以通过网络连接从策略门户获取组策略设置,并且使用获取的组策略设置更新客户端计算机系统的本地策略高速缓存。 可以通过网络连接查询策略门户,以确定存储在策略门户中的组策略设置的年龄。 如果本地策略缓存中的组策略设置比策略门户中存储的组策略设置更早,则从策略门户中获取组策略设置,以更新本地策略缓存。 如果本地策略缓存不包含组策略设置,则可以从用于更新本地策略高速缓存的策略门户中获取组策略设置。 用于在一个或多个客户端计算机系统上管理组策略设置的方法包括:通过网络从客户端计算机系统接收对组策略设置的请求,并响应于客户机请求将组策略设置发送到客户端计算机系统。 确定与客户端计算机系统相关联的域,并且从对应于所确定的域的域控制器请求组策略设置。 可以从策略设置数据库检索与客户端计算机系统相关联的组策略设置。
    • 9. 发明申请
    • Access control in a computer system
    • 计算机系统中的访问控制
    • US20060193467A1
    • 2006-08-31
    • US11355916
    • 2006-02-16
    • Joseph Levin
    • Joseph Levin
    • H04M1/00
    • G06F21/6281G06F21/6218G06F2221/2101G06F2221/2141
    • A technique for controlling a software process's access to securable objects that utilizes the native security mechanisms of an operating system. According to an aspect of the technique (i) a group is created, (ii) rights for the group are defined, (iii) the group is associated with a program image and (iv) the group is assigned to processes created from the program image. Specifically, access tokens associated with processes created from the program image are modified to include the groups associated with the program image. The modified access tokens are used by the operating system's native security mechanisms to determine if the processes, created from the program image, may gain access to securable objects.
    • 一种用于控制软件进程对使用操作系统的本机安全机制的安全对象的访问的技术。 根据该技术的一个方面(i)创建一个组,(ii)定义组的权限,(iii)组与节目图像相关联,并且(iv)将该组分配给从该节目创建的过程 图片。 具体来说,与从程序图像创建的进程相关联的访问令牌被修改为包括与程序图像相关联的组。 修改的访问令牌由操作系统的本机安全机制使用,以确定从程序映像创建的进程是否可以访问安全对象。