会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Provisioning an operating environment of a remote computer
    • 配置远程计算机的操作环境
    • US07779469B2
    • 2010-08-17
    • US11927310
    • 2007-10-29
    • Chris HopenGary TomlinsonParvez AnandamBrian YoungAlan Flagg
    • Chris HopenGary TomlinsonParvez AnandamBrian YoungAlan Flagg
    • G06F15/173
    • G06F21/6218
    • Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource.
    • 提供了系统和技术来控制来自远程计算机的资源请求。 远程计算机访问资源的能力是根据计算机的操作环境确定的。 负责控制资源访问的计算机或计算机将询问远程计算机以确定其操作环境。 负责控制对资源的访问的计算机或计算机可以例如将一个或多个询问器代理下载到远程计算机上以确定其操作环境。 基于询问结果,负责控制对资源的访问的计算机或计算机将控制远程计算机对所请求的资源的访问。
    • 8. 发明申请
    • End point control
    • 终点控制
    • US20050144481A1
    • 2005-06-30
    • US11009692
    • 2004-12-10
    • Chris HopenGary TomlinsonParvez AnandamBrian YoungAlan Flagg
    • Chris HopenGary TomlinsonParvez AnandamBrian YoungAlan Flagg
    • G06F21/00H04L9/00
    • G06F21/6218
    • Systems and techniques are provided for controlling requests for resources from remote computers. A remote computer's ability to access a resource is determined based upon the computer's operating environment. The computer or computers responsible for controlling access to a resource will interrogate the remote computer to ascertain its operating environment. The computer or computers responsible for controlling access to a resource may, for example, download one or more interrogator agents onto the remote computer to determine its operating environment. Based upon the interrogation results, the computer or computers responsible for controlling access to a resource will control the remote computer's access to the requested resource.
    • 提供了系统和技术来控制来自远程计算机的资源请求。 远程计算机访问资源的能力是根据计算机的操作环境确定的。 负责控制资源访问的计算机或计算机将询问远程计算机以确定其操作环境。 负责控制对资源的访问的计算机或计算机可以例如将一个或多个询问器代理下载到远程计算机上以确定其操作环境。 基于询问结果,负责控制对资源的访问的计算机或计算机将控制远程计算机对所请求的资源的访问。