会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 13. 发明授权
    • Method, software and apparatus for referencing a method in object-based programming
    • 用于引用基于对象的编程中的方法的方法,软件和装置
    • US06381734B1
    • 2002-04-30
    • US09089619
    • 1998-06-03
    • Peter H. GoldeAnders HejlsbergChad W. RoyalTracy C. SharpeMichael J. ToutonghiEdward H. WaytScott M. Wiltamuth
    • Peter H. GoldeAnders HejlsbergChad W. RoyalTracy C. SharpeMichael J. ToutonghiEdward H. WaytScott M. Wiltamuth
    • G06F945
    • G06F9/449
    • Method and apparatus for encapsulating a reference to a method in object-based programming systems and ensuring that the reference is safe are disclosed. The method of encapsulation provides for: a) defining an entity that defines the shape of the method to be referenced; b) obtaining a reference to a method; c) storing this reference in arbitrary data structures; d) passing the reference to code written by other parties; e) enabling invocation of the method by anyone holding the method reference; and f) enabling the holder of a method reference to determine the target object and method being referenced. These objectives are achieved in a strongly typed manner, making it possible for: a) developers to learn of type mismatch problems early (at compile-time) rather than late (at run-time); and b) development tools to present information to developers about the shape of components that use delegates. In addition, a model of event based programming is disclosed, wherein event-related code can be encapsulated in delegates.
    • 公开了一种用于封装对基于对象的编程系统中的方法的参考并确保参考是安全的方法和装置。 封装方法提供:a)定义定义要引用的方法的形状的实体; b)获得对方法的引用; c)将此参考存储在任意数据结构中; d)传递其他方面编写的代码; e)允许任何持有方法引用的方法的调用; 以及f)使得方法引用的持有人能够确定所引用的目标对象和方法。 这些目标是以强力类型的方式实现的,从而有可能:a)开发人员早期(在编译时)而不是迟到(在运行时)学习类型不匹配问题; 和b)开发工具向开发人员介绍使用代表的组件的形状。 另外,公开了一种基于事件的编程的模型,其中事件相关代码可以封装在委托中。
    • 14. 发明授权
    • Directional set operations for permission based security in a computer system
    • 计算机系统中基于权限的安全性的定向集操作
    • US06345361B1
    • 2002-02-05
    • US09116515
    • 1998-07-15
    • Michael S. JergerJeffrey A. BissetCraig T. SinclairMichael J. Toutonghi
    • Michael S. JergerJeffrey A. BissetCraig T. SinclairMichael J. Toutonghi
    • G06F1130
    • G06F21/62
    • Computer-based systems and methods are disclosed for a comprehensive security model for managing active content downloaded from a computer network. The security model includes the configuration of a system security policy that is stored on a host computer. The system security policy is configured by security zone in progressively “finer grain” levels with each level associated with and defining the previous level. These levels may include: protected operations; user permission sets, permissions, parameters and primitives associated with parameters. A requested permission set is provided by the publisher of active content that lists the permissions that the active content requires in order to run on the host system. The requested permission set is automatically compared to one or more user permission sets to determine the permissions, if any that will be granted on the host system. The automated set comparisons includes determining a directional permissions sets comparison result, which is “directional” in that it maintains the distinction between the “superior” user-defined set and the “inferior” requested set. Determining the directional permissions sets comparison result may include determining directional primitive comparison results and merging them into a directional parameter comparison result; and determining directional parameter comparison results and merging them into a directional permission comparison result; and, determining directional permission comparison results and merging them into a directional permissions sets comparison result. The disclosed method may be practiced in the comparison of any two sets where a directional result is desirable.
    • 公开了基于计算机的系统和方法,用于管理从计算机网络下载的活动内容的综合安全模型。 安全模型包括存储在主机上的系统安全策略的配置。 系统安全策略由安全区域逐步“细粒度”级配置,每个级别与先前级别相关联并定义。 这些级别可能包括:受保护的操作; 用户权限集,权限,与参数关联的参数和原语。 所请求的权限集由活动内容的发布者提供,列出活动内容在主机系统上运行所需的权限。 所请求的权限集合将自动与一个或多个用户权限集进行比较,以确定在主机系统上授予的权限。 自动设置比较包括确定方向权限集合比较结果,其是“方向性的”,因为它维护“上级”用户定义集和“下级”请求集之间的区别。 确定方向权限集比较结果可以包括确定方向性原语比较结果并将它们合并成方向参数比较结果; 并确定方向参数比较结果并将其合并成方向权限比较结果; 并且确定方向权限比较结果并将它们合并成方向权限集比较结果。 所公开的方法可以在需要方向结果的任何两组的比较中实践。
    • 18. 发明授权
    • Administering permissions associated with a security zone in a computer system security model
    • 管理与计算机系统安全模型中的安全区域相关联的权限
    • US06321334B1
    • 2001-11-20
    • US09116514
    • 1998-07-15
    • Michael S. JergerJeffrey A. BissetCraig T. SinclairMichael J. Toutonghi
    • Michael S. JergerJeffrey A. BissetCraig T. SinclairMichael J. Toutonghi
    • G06F1224
    • G06F21/54
    • Computer-based systems and methods are disclosed for a comprehensive security model for managing foreign content downloaded from a computer network. The methods and systems include the configuration of a system security policy that is stored on a host computer. The system security policy includes one or more independently configurable security zones. Each security zone corresponds to a group of network locations and may have one or more associated configurable protected operations that control the access to the host system by foreign content downloaded from the computer network. A protected operations may have one or more associated configurable permissions that define the capabilities of the protected operation. Each permission may be defined by one or more parameters and each parameter may be defined by one or more primitives. The permissions may be defined to enable the permission, disable the permission, or prompt the user when the permission is required. The permission may also be configured to the “fine grained” level of the primitives. Default permission levels that provide predefined parameter and primitive entries that are grouped as high security, medium security, and low security may be selected by the user at most levels of the configuration.
    • 公开了基于计算机的系统和方法,用于管理从计算机网络下载的外部内容的综合安全模型。 方法和系统包括存储在主机上的系统安全策略的配置。 系统安全策略包括一个或多个可独立配置的安全区域。 每个安全区域对应于一组网络位置,并且可以具有一个或多个相关联的可配置保护操作,其通过从计算机网络下载的外部内容来控制对主机系统的访问。 受保护的操作可以具有定义受保护操作的能力的一个或多个相关联的可配置许可。 每个权限可以由一个或多个参数定义,并且每个参数可以由一个或多个基元定义。 可以定义权限以启用权限,禁用权限,或在需要权限时提示用户。 许可也可以被配置为基元的“细粒度”级别。 可以由用户在配置的大多数级别选择提供分组为高安全性,中等安全性和低安全性的预定义参数和原语条目的默认权限级别。