会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Distributed system and method for providing SQL access to management information in a secure distributed network
    • 用于在安全分布式网络中提供SQL访问管理信息的分布式系统和方法
    • US06212511B1
    • 2001-04-03
    • US08962092
    • 1997-10-31
    • Bart Lee FisherRajeev AngalSai V. S. Allavarpu
    • Bart Lee FisherRajeev AngalSai V. S. Allavarpu
    • G06F1730
    • H04L41/28G06F1/00G06F21/6227H04L41/024H04L63/101Y10S707/99931
    • An access control database defines access rights through the use of access control objects. The access control objects include group objects, each defining a group and a set of users who are members of the group, and rule objects. A first subset of the rule objects each specify a set of the group objects, a set of the management objects, and access rights by the users who are members of the groups defined by the specified set of the group objects to the specified set of management objects. The access control server responds to the access requests from the users by granting, denying and partially granting and denying the access requested in each access request in accordance with the access rights specified in the access control database. A database management system receives management information from the network and stores that information in a set of database tables. A database access privileges module stores table access rights information corresponding to at least a subset of the access rights stored in access control database. A database access engine receives user requests for management information stored in the database tables. It limits user access to the management information stored in the database tables in accordance with the table access rights information stored in the database access privileges module.
    • 访问控制数据库通过使用访问控制对象来定义访问权限。 访问控制对象包括组对象,每个对象定义组和一组作为组成员的用户以及规则对象。 规则对象的第一个子集每个都指定一组组对象,一组管理对象,以及由指定的组对象定义的组的成员的用户到指定的一组管理的访问权限 对象 访问控制服务器根据访问控制数据库中指定的访问权限,通过授予,拒绝和部分授予和拒绝在每个访问请求中请求的访问来响应来自用户的访问请求。 数据库管理系统从网络接收管理信息,并将该信息存储在一组数据库表中。 数据库访问权限模块存储对应于访问控制数据库中存储的访问权限的至少一个子集的表访问权限信息。 数据库访问引擎接收用户对存储在数据库表中的管理信息的请求。 它根据存储在数据库访问权限模块中的表访问权限信息限制用户对存储在数据库表中的管理信息的访问。
    • 2. 发明授权
    • Distributed system and method for controlling access control to network
resources
    • 用于控制对网络资源的访问控制的分布式系统和方法
    • US06064656A
    • 2000-05-16
    • US962089
    • 1997-10-31
    • Rajeev AngalSai V. S. AllavarpuShivaram BhatBart Lee FisherPing Luo
    • Rajeev AngalSai V. S. AllavarpuShivaram BhatBart Lee FisherPing Luo
    • G06F13/00G06F1/00G06F12/14G06F21/00H04L29/06H04L12/28
    • H04L63/102G06F21/6218H04L29/06H04L63/105H04L63/20G06F12/1483H04L67/42
    • An access control database defines access rights through the use of access control objects. The access control objects include group objects, each defining a group and a set of users who are members of the group, and rule objects. Some of the rule objects each specify a set of the group objects, a set of the management objects, and access rights by the users who are members of the groups defined by the specified set of the group objects to the specified set of management objects. A plurality of access control servers are used to process access requests. Each access control server controls access to a distinct subset of the management objects in accordance with the access rights specified in the access control database. At least one of the access control servers receives access requests from the users and distributes the received access requests among the access control servers for processing. A subset of the access requests specify operations to be performed on specified sets of the management objects. Each of these access requests is sent for processing to one or more of the access control servers in accordance with the management objects to which access is being requested. The access control servers responding to the access requests from the users by granting, denying and partially granting and denying the access requested in each access request in accordance with the access rights specified in the access control database.
    • 访问控制数据库通过使用访问控制对象来定义访问权限。 访问控制对象包括组对象,每个对象定义组和一组作为组成员的用户以及规则对象。 一些规则对象每个都指定一组组对象,一组管理对象,以及由指定的组对象定义的组的成员的用户到指定的一组管理对象的访问权限。 多个访问控制服务器用于处理访问请求。 每个访问控制服务器根据访问控制数据库中指定的访问权限来控制对管理对象的不同子集的访问。 访问控制服务器中的至少一个接收来自用户的访问请求,并且在接入控制服务器之间分配所接收的访问请求以进行处理。 访问请求的子集指定要对指定的管理对象集执行的操作。 根据正在请求访问的管理对象,将这些访问请求中的每一个发送到一个或多个访问控制服务器进行处理。 访问控制服务器根据访问控制数据库中指定的访问权限,授予,拒绝和部分授予和拒绝在每个访问请求中请求的访问来响应来自用户的访问请求。
    • 3. 发明授权
    • Distributed system and method for controlling access to network
resources and event notifications
    • 用于控制对网络资源和事件通知的访问的分布式系统和方法
    • US5999978A
    • 1999-12-07
    • US962090
    • 1997-10-31
    • Rajeev AngalSai V.S. AllavarpuShivaram BhatBart Lee Fisher
    • Rajeev AngalSai V.S. AllavarpuShivaram BhatBart Lee Fisher
    • G06F13/00G06F1/00G06F12/14G06F21/00G06F13/38G06F15/17
    • H04L63/105G06F21/305G06F21/604G06F21/6218H04L41/28G06F12/1483G06F2221/2101G06F2221/2141G06F2221/2145Y10S707/99939
    • An access control database defines access rights through the use of access control objects. The access control objects include group objects, each defining a group and a set of users who are members of the group, and rule objects. A first subset of the rule objects each specify a set of the group objects, a set of the management objects, and access rights by the users who are members of the groups defined by the specified set of the group objects to the specified set of management objects. The access control server responds to the access requests from the users by granting, denying and partially granting and denying the access requested in each access request in accordance with the access rights specified in the access control database. A second subset of the rule objects in the access control database each specify user access rights to event notifications generated by the specified set of management objects. An event registry is used for registering event notification requests by users, each event notification request specifying event notifications from specified sets of the management objects that are being requested. An event router receives event notifications generated by the management objects. It responds to each event notification by sending corresponding event notification messages to users who have registered a corresponding event notification request with the event registry and also have access rights to the received event notification in accordance with the access rights specified in the access control database.
    • 访问控制数据库通过使用访问控制对象来定义访问权限。 访问控制对象包括组对象,每个对象定义组和一组作为组成员的用户以及规则对象。 规则对象的第一个子集每个都指定一组组对象,一组管理对象,以及由指定的组对象定义的组的成员的用户到指定的一组管理的访问权限 对象 访问控制服务器根据访问控制数据库中指定的访问权限,通过授予,拒绝和部分授予和拒绝在每个访问请求中请求的访问来响应来自用户的访问请求。 访问控制数据库中的规则对象的第二个子集每个都指定由指定的一组管理对象生成的事件通知的用户访问权限。 事件注册表用于注册用户的事件通知请求,每个事件通知请求指定正在请求的管理对象的指定集合的​​事件通知。 事件路由器接收管理对象生成的事件通知。 它通过向已经向事件注册表注册了相应事件通知请求的用户发送相应的事件通知消息来响应每个事件通知,并且还根据访问控制数据库中指定的访问权限对接收的事件通知具有访问权限。
    • 5. 发明授权
    • Method and system for multi-protocol single logout
    • 多协议单一注销的方法和系统
    • US08099768B2
    • 2012-01-17
    • US12233377
    • 2008-09-18
    • Qingwen ChengPing LuoAndrew PattersonRajeev Angal
    • Qingwen ChengPing LuoAndrew PattersonRajeev Angal
    • H04L29/00
    • G06F21/41H04L63/0815H04L69/18
    • A method for multi-protocol logout. The method includes receiving, by a first identity provider, a logout request from a user agent, wherein the first identity provider executes in a federation manager, and initiating a logout on a service provider associated with the first identity provider based on the logout request by the first identity provider. The method further includes identifying, by the federation manager, a plurality of identity providers associated with the user agent, wherein the plurality of identity providers communicate using heterogeneous federation protocols, and initiating, by the federation manager, a logout on each of the plurality of identity providers based on the logout request using the plurality of heterogeneous federation protocols. The method further includes initiating, by the plurality of identity providers, a logout of each service provider corresponding to the plurality of identity providers, identifying a status of each logout, and sending the status to the user agent.
    • 一种多协议注销的方法。 所述方法包括由第一身份提供者接收来自用户代理的注销请求,其中所述第一身份提供者在联合管理器中执行,并且基于所述注销请求,在与所述第一身份提供商相关联的服务提供商上发起登出 第一个身份提供商。 所述方法还包括由所述联盟管理器识别与所述用户代理相关联的多个身份提供者,其中所述多个身份提供者使用异构联盟协议进行通信,并且由所述联盟管理器发起在所述多个 基于使用多个异构联合协议的注销请求的身份提供者。 所述方法还包括由所述多个身份提供者发起对应于所述多个身份提供者的每个服务提供商的注销,识别每个注销的状态,以及将所述状态发送给所述用户代理。
    • 7. 发明授权
    • Methods systems and software for alleviating event overload conditions for computer networks
    • 用于减轻计算机网络事件超载条件的方法系统和软件
    • US06301624B1
    • 2001-10-09
    • US09205324
    • 1998-12-04
    • Linda LeeSubodh BapatRajeev Angal
    • Linda LeeSubodh BapatRajeev Angal
    • G06F1300
    • H04L41/0681G06F9/542H04L29/06H04L41/0213H04L41/0226H04L69/08
    • A method for processing events generated by software and hardware entities installed on a computer network that avoids overload conditions at large event processing rates is provided. In one embodiment, the method includes the steps of providing a protocol translation facility that is configured to translate messages from a first network communications protocol to a second network communications protocol. The protocol translation facility is further configured to receive events transmitted by software and hardware entities on the network. The protocol translation facility forwards the events to a management information server. An event is received, and a determination is made whether an association between the protocol translation facility and the entity exists. The event is processed
    • 提供了一种用于处理安装在计算机网络上的软件和硬件实体生成的事件的方法,其避免了大事件处理速率下的过载状况。 在一个实施例中,该方法包括以下步骤:提供被配置为将消息从第一网络通信协议转换为第二网络通信协议的协议转换设施。 协议翻译设备还被配置为接收由网络上的软件和硬件实体发送的事件。 协议转换工具将事件转发到管理信息服务器。 接收事件,确定协议翻译设备与实体之间的关联是否存在。 事件被处理
    • 8. 发明授权
    • Event distribution system for computer network management architecture
    • 计算机网络管理架构事件分配系统
    • US06298378B1
    • 2001-10-02
    • US09205072
    • 1998-12-04
    • Rajeev AngalShivaram BhatSubodh BapatRagavendra Sondur
    • Rajeev AngalShivaram BhatSubodh BapatRagavendra Sondur
    • G06F15173
    • G06F9/542H04L41/0604
    • Improved techniques for reporting events raised by entities running on computer networks are disclosed. The techniques provide an event distribution system that handles events generated by various software and other entities installed on a computer or communications network. The event distribution system is capable of handling large volumes of event traffic and can be installed and operated separately from other network management software components to provide thereby more robust operations in the case one or more components fail. In addition, the event distribution system can be scaled readily to handle greater volumes of network traffic. In one embodiment, an event distribution service is coupled with an event source. In addition, an event listener is provided on the computer network. When an event is generated from the event source and received by the event distribution system, the event distribution system processes and forwards the event, or a notification of the event, to an appropriate listener.
    • 披露了用于报告在计算机网络上运行的实体提出的事件的改进技术。 这些技术提供了处理由计算机或通信网络上安装的各种软件和其他实体产生的事件的事件分发系统。 事件分配系统能够处理大量事件流量,并且可以与其他网络管理软件组件分开安装和操作,从而在一个或多个组件出现故障的情况下提供更强大的操作。 此外,事件分配系统可以轻松扩展,以处理更大量的网络流量。 在一个实施例中,事件分发服务与事件源耦合。 另外,在计算机网络上提供事件侦听器。 当从事件源生成事件并由事件分发系统接收到事件时,事件分发系统将事件或事件的通知处理并转发给适当的侦听器。
    • 9. 发明授权
    • User device security manager
    • 用户设备安全管理器
    • US09230089B2
    • 2016-01-05
    • US13709705
    • 2012-12-10
    • Rajeev Angal
    • Rajeev Angal
    • G06F21/30G06F21/44G06F21/31G06F21/10G06F21/60G06F21/62
    • G06F21/44H04L63/10H04L63/12
    • Systems and methods are disclosed to authenticate and authorize a user for web services using user devices. In various embodiments, a method may comprise: identifying, by a user device security manager executing at a user device corresponding to a user of a web service, a first request issued from an application to access remote resources associated with the web service, the application executing at the user device and separate from the user device security manager; acquiring, by the user device security manager, security information of the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce of the application; and transmitting a second request from the user device security manager to the web service to authenticate the application by the web service based, at least in part, on the application identification.
    • 公开了系统和方法,以使用用户设备来认证和授权用户进行web服务。 在各种实施例中,一种方法可以包括:由用户设备在对应于web服务的用户的用户设备上执行的用户设备识别从应用程序发出的访问与web服务相关联的远程资源的第一请求,该应用 在用户设备执行并与用户设备安全管理器分离; 所述安全信息包括应用标识,访问范围或所述应用的随机数中的至少一个;所述安全信息包括所述应用标识,访问范围或所述应用的随机数; 以及至少部分地基于所述应用标识,将来自所述用户设备安全管理器的第二请求从所述web服务发送到所述web服务以由所述web服务进行认证。