会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • Client-specified schema extensions in cloud computing environments
    • 云计算环境中客户端指定的模式扩展
    • US08805971B1
    • 2014-08-12
    • US13524945
    • 2012-06-15
    • Gregory B. RothJames E. Scharf, Jr.Rajiv RamachandranAnders SamuelssonKeith A. Carlson
    • Gregory B. RothJames E. Scharf, Jr.Rajiv RamachandranAnders SamuelssonKeith A. Carlson
    • G06F15/177
    • G06F9/5072
    • Methods and apparatus for client-specified schema extensions in cloud computing environments are disclosed. A system includes a plurality of service managers coordinating respective multitenant network-accessible services, and one or more computer servers. In response to a schema extension request specifying a client account, a client attribute set, and a client data source, the one or more computer servers generate a composite schema customized for the client account comprising (a) attributes of a plurality of resources implementing the functionality of at least one service to which the client account has access and (b) the client attribute set. In response to an account state view request specifying the client account, the one or more computer servers provide a state representation comprising (a) at least one value of a particular client attribute and (b) at least one attribute value of a resource.
    • 披露了云计算环境中用于客户端指定的模式扩展的方法和装置。 系统包括协调相应的多租户网络可访问服务的多个服务管理器和一个或多个计算机服务器。 响应于指定客户帐户,客户端属性集和客户端数据源的模式扩展请求,所述一个或多个计算机服务器生成为该客户帐户定制的复合模式,其包括(a)多个资源的属性, 至少一个客户帐户具有访问权限的服务的功能,以及(b)客户端属性集。 响应于指定客户帐户的帐户状态视图请求,一个或多个计算机服务器提供状态表示,其包括(a)特定客户端属性的至少一个值和(b)资源的至少一个属性值。
    • 52. 发明授权
    • Policy compliance-based secure data access
    • 基于策略合规性的安全数据访问
    • US08756651B2
    • 2014-06-17
    • US13246445
    • 2011-09-27
    • Graeme D. BaerGregory B. Roth
    • Graeme D. BaerGregory B. Roth
    • G06F21/00G06F21/57H04L29/06
    • G06F21/577H04L63/08H04L63/20H04L2463/081
    • Access control techniques relate to verifying compliance with security policies before enabling access to the computing resources. An application is provided on a client that generates verification codes using an authentication seed. Prior to granting the client the authentication seed necessary to generate a verification code, a server may perform a policy check on the client. Some embodiments ensure that the client complies with security policies imposed by an authenticating party by retrieving a number of parameter values from the client and then determining whether those parameter values comply with the security policies. Upon determining that the client complies, the authentication seed is issued to the client. In some embodiments, the authentication seed is provided such that a policy check is performed upon the generation of a verification code. The client is given access to secure information when the client is determined to comply with the security policies.
    • 访问控制技术涉及在启用对计算资源的访问之前验证对安全策略的遵从性。 在使用认证种子生成验证码的客户端上提供应用程序。 在授予客户端生成验证码所需的认证种子之前,服务器可以对客户端执行策略检查。 一些实施例确保客户端通过从客户端检索多个参数值,然后确定这些参数值是否符合安全策略,从而符合认证方施加的安全策略。 在确定客户端符合的情况下,向客户端发出认证种子。 在一些实施例中,提供认证种子,使得在生成验证码时执行策略检查。 当客户端确定遵守安全策略时,客户端可以访问安全信息。
    • 53. 发明授权
    • Virtual requests
    • 虚拟请求
    • US08656471B1
    • 2014-02-18
    • US13418230
    • 2012-03-12
    • Nicholas Alexander AllenGregory B. RothElena Dykhno
    • Nicholas Alexander AllenGregory B. RothElena Dykhno
    • H04L29/06
    • H04L63/08H04L67/2823
    • A first request from a client using a first protocol is translated into one or more second requests by a servicer using a second protocol through a virtual request using the first protocol. A client may use parameters of the first protocol to pass virtual request components to the servicer. A format agreement between the client, servicer and/or authentication service may allow the servicer and/or authentication service to translate virtual request components over the first protocol to one or more second requests using the second protocol. Virtual request components may also prove the authenticity of the virtual request received by the servicer to an authentication service. Once satisfied the virtual request is valid, the authentication service may issue a credential to the servicer to send the one or more second requests to an independent service. Virtual requests may be included in various protocols, including credential-based protocols and certificate exchange-based protocols.
    • 来自使用第一协议的客户端的第一请求由服务器使用第一协议通过虚拟请求使用第二协议转换成一个或多个第二请求。 客户端可以使用第一协议的参数将虚拟请求组件传递给服务器。 客户机,服务器和/或认证服务之间的格式协议可以允许服务器和/或认证服务通过第一协议将虚拟请求组件转换成使用第二协议的一个或多个第二请求。 虚拟请求组件也可以证明服务器接收到的认证服务的虚拟请求的真实性。 一旦满足虚拟请求是有效的,则认证服务可以向服务器发出凭证以将一个或多个第二请求发送到独立服务。 虚拟请求可以包括在各种协议中,包括基于证书的协议和基于证书交换的协议。
    • 55. 发明申请
    • POLICY COMPLIANCE-BASED SECURE DATA ACCESS
    • 基于政策合规性的安全数据访问
    • US20130081101A1
    • 2013-03-28
    • US13246445
    • 2011-09-27
    • Graeme D. BaerGregory B. Roth
    • Graeme D. BaerGregory B. Roth
    • G06F21/00
    • G06F21/577H04L63/08H04L63/20H04L2463/081
    • Access control techniques relate to verifying compliance with security policies before enabling access to the computing resources. An application is provided on a client that generates verification codes using an authentication seed. Prior to granting the client the authentication seed necessary to generate a verification code, a server may perform a policy check on the client. Some embodiments ensure that the client complies with security policies imposed by an authenticating party by retrieving a number of parameter values from the client and then determining whether those parameter values comply with the security policies. Upon determining that the client complies, the authentication seed is issued to the client. In some embodiments, the authentication seed is provided such that a policy check is performed upon the generation of a verification code. The client is given access to secure information when the client is determined to comply with the security policies.
    • 访问控制技术涉及在启用对计算资源的访问之前验证对安全策略的遵从性。 在使用认证种子生成验证码的客户端上提供应用程序。 在授予客户端生成验证码所需的认证种子之前,服务器可以对客户端执行策略检查。 一些实施例确保客户端通过从客户端检索多个参数值,然后确定这些参数值是否符合安全策略,从而符合认证方施加的安全策略。 在确定客户端符合的情况下,向客户端发出认证种子。 在一些实施例中,提供认证种子,使得在生成验证码时执行策略检查。 当客户端确定遵守安全策略时,客户端可以访问安全信息。