会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Access control based on program properties
    • 基于程序属性的访问控制
    • US08239954B2
    • 2012-08-07
    • US11745048
    • 2007-05-07
    • Edward P. WobberAndrew BirrellMartin Abadi
    • Edward P. WobberAndrew BirrellMartin Abadi
    • H04L29/06
    • H04L63/101G06F21/6218
    • A pattern matching access control system determines whether a principal should be granted access to use a resource based on properties of applications comprised by the principal. The principal name may be created when an application is loaded, invokes other applications (or programs) and/or assumes a new role context. Access is provided based on whether, for each application, the publisher is authorized by system policy to grant privilege as requested by the application. When a resource which requires the privilege is requested by a principal, an access control list (ACL) for the resource is expanded with a list of applications that have been authorized through their publisher to assert the privilege. The expanded ACL is compared to the principal name to determine resource access.
    • 模式匹配访问控制系统基于主体的应用程序的属性确定是否应授予主体访问权限以使用资源。 可以在应用程序加载时调用主体名称,调用其他应用程序(或程序)和/或假定新的角色上下文。 访问是基于每个应用程序,发布者是否被系统策略授权以根据应用程序请求授予特权来提供访问。 当一个委托人请求一个需要该权限的资源时,该资源的访问控制列表(ACL)会被扩展,并通过其发布者授权的应用程序列表来声明该权限。 将扩展的ACL与主体名称进行比较以确定资源访问。
    • 13. 发明授权
    • Access control subsystem and method for distributed computer system
using compound principals
    • 使用复合主体的分布式计算机系统的访问控制子系统和方法
    • US5173939A
    • 1992-12-22
    • US783361
    • 1991-10-28
    • Martin AbadiMichael BurrowsEdward P. Wobber
    • Martin AbadiMichael BurrowsEdward P. Wobber
    • G06F9/46
    • G06F9/468Y10S707/99939
    • A distributed computer system has a number of computers coupled thereto at distinct nodes and a naming service with a membership table that defines a list of assumptions concerning which principals in the system are stronger than other principals, and which roles adopted by principals are stronger than other roles. Each object in the system has an access control list (ACL) having a list of entries. Each entry is either a simple principal or a compound principal. The set of allowed compound principals is limited to a predefined set of allowed combinations of simple principals, roles, delegations and conjunctions in accordance with a defined hierarchical ordering of the conjunction, delegation and role portions of each compound principal. The assumptions in the membership table reduce the number of entries needed in an ACL by allowing an entry to state only the weakest principals and roles that are to be allowed access. The reference checking process, handled by a reference monitor found at each node of the distributed system, grants an access request if the requestor is stronger than any one of the entries in the access control list for the resource requested. Furthermore, one entry is stronger than another entry if for each of the conjuncts in the latter entry there is a stronger conjunct in the former. Additional rules used by the reference monitor during the reference checking process govern the processes of comparing conjuncts in a requestor principal with the conjuncts in an access control list entry and of using assumptions to compare the relative strengths of principals and roles.
    • 分布式计算机系统具有多个与不同节点耦合的计算机,以及具有会员表的命名服务,该成员表定义了系统中哪些主体比其他主体更强的假设列表,以及由主体采用的角色比其他主体更强 角色。 系统中的每个对象都具有一个具有条目列表的访问控制列表(ACL)。 每个条目都是简单的主体或复合主体。 允许的复合主体的集合被限制为根据每个复合主体的连接,委派和角色部分的定义的分级顺序的简单主体,角色,委托和连接的允许的组合的预定义集合。 成员资格表中的假设通过允许条目仅指定允许访问的最弱主体和角色来减少ACL中所需的条目数。 如果请求者比所请求的资源的访问控制列表中的任何一个条目更强,由在分布式系统的每个节点处发现的参考监视器处理的参考检查过程就会授予访问请求。 此外,如果对于前一个条目中的每个连词都有一个更强的连接,则一个条目比另一个条目更强。 引用检查过程中参考监视器使用的附加规则管理将请求方主体中的连接与访问控制列表条目中的连接进行比较的过程,以及使用假设来比较主体和角色的相对强度。
    • 16. 发明授权
    • Host accountability using unreliable identifiers
    • 使用不可靠的标识符托管问责制
    • US08185613B2
    • 2012-05-22
    • US12479882
    • 2009-06-08
    • Yinglian XieFang YuMartin Abadi
    • Yinglian XieFang YuMartin Abadi
    • G06F17/30
    • H04L63/1408H04L2463/144
    • An IP (Internet Protocol) address is a directly observable identifier of host network traffic in the Internet and a host's IP address can dynamically change. Analysis of traffic (e.g., network activity or application request) logs may be performed and a host tracking graph may be generated that shows hosts and their bindings to IP addresses over time. A host tracking graph may be used to determine host accountability. To generate a host tracking graph, a host is represented. Host representations may be application-dependent. In an implementation, application-level identifiers (IDs) such as user email IDs, messenger login IDs, social network IDs, or cookies may be used. Each identifier may be associated with a human user. These unreliable IDs can be used to track the activity of the corresponding hosts.
    • IP(互联网协议)地址是互联网中主机网络流量的直接可观察标识符,主机的IP地址可以动态更改。 可以执行流量分析(例如,网络活动或应用请求)日志,并且可以生成显示主机及其与IP地址的绑定的主机跟踪图。 可以使用主机跟踪图来确定主机责任。 要生成主机跟踪图,表示主机。 主机表示可能取决于应用程序。 在实现中,可以使用诸如用户电子邮件ID,信使登录ID,社交网络ID或cookie的应用级标识符(ID)。 每个标识符可以与人类用户相关联。 这些不可靠的ID可用于跟踪相应主机的活动。
    • 17. 发明授权
    • Memory conflict detection via mapping of the physical heap to control access permissions to the memory
    • 通过物理堆映射来检测内存冲突,以控制对内存的访问权限
    • US08180986B2
    • 2012-05-15
    • US12212025
    • 2008-09-17
    • Timothy HarrisMartin Abadi
    • Timothy HarrisMartin Abadi
    • G06F12/00
    • G06F12/145G06F9/528
    • A transactional memory system is described for reporting memory access violations which occur when memory accesses made from instructions within a transaction conflict with memory accesses to the same memory location made from a non-transactional instruction. In an embodiment this is achieved by creating two mappings of a physical heap being used by a thread. The thread (which may be part of a multi-threaded process) comprises instructions for both transactional and non-transactional accesses to the physical heap which may execute concurrently as part of that thread. One of the mappings is used for non-transactional memory accesses to the physical heap. The other mapping is used for transactional memory accesses to the physical heap. Access permissions associated with the mappings are controlled to enable attempted memory access violations to be detected and reported.
    • 描述了一种事务性存储器系统,用于报告存储器访问冲突的发生,当由事务内的指令进行的存储器访问与从非事务性指令进行的存储器访问的存储器访问冲突时发生。 在一个实施例中,这是通过创建由线程使用的物理堆的两个映射来实现的。 线程(可以是多线程进程的一部分)包括用于对物理堆的事务和非事务性访问的指令,该物理堆可以作为该线程的一部分同时执行。 其中一个映射用于对物理堆的非事务内存访问。 另一个映射用于对物理堆的事务内存访问。 控制与映射关联的访问权限,以便检测和报告尝试的内存访问冲突。
    • 19. 发明申请
    • Transactional Memory System
    • 事务性内存系统
    • US20100070727A1
    • 2010-03-18
    • US12212025
    • 2008-09-17
    • Timothy HarrisMartin Abadi
    • Timothy HarrisMartin Abadi
    • G06F12/14
    • G06F12/145G06F9/528
    • A transactional memory system is described for reporting memory access violations which occur when memory accesses made from instructions within a transaction conflict with memory accesses to the same memory location made from a non-transactional instruction. In an embodiment this is achieved by creating two mappings of a physical heap being used by a thread. The thread (which may be part of a multi-threaded process) comprises instructions for both transactional and non-transactional accesses to the physical heap which may execute concurrently as part of that thread. One of the mappings is used for non-transactional memory accesses to the physical heap. The other mapping is used for transactional memory accesses to the physical heap. Access permissions associated with the mappings are controlled to enable attempted memory access violations to be detected and reported.
    • 描述了一种事务性存储器系统,用于报告存储器访问冲突的发生,当由事务内的指令进行的存储器访问与从非事务性指令进行的存储器访问的存储器访问冲突时发生。 在一个实施例中,这是通过创建由线程使用的物理堆的两个映射来实现的。 线程(可以是多线程进程的一部分)包括用于对物理堆的事务和非事务性访问的指令,该物理堆可以作为该线程的一部分同时执行。 其中一个映射用于对物理堆的非事务内存访问。 另一个映射用于对物理堆的事务内存访问。 控制与映射关联的访问权限,以便检测和报告尝试的内存访问冲突。