会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SYSTEM AND METHOD FOR MANAGING VIRTUAL MACHINE CONFIGURATIONS
    • 用于管理虚拟机配置的系统和方法
    • US20130247033A1
    • 2013-09-19
    • US12636414
    • 2009-12-11
    • Harvinder Singh SawhneySuman SarafRosen Sharma
    • Harvinder Singh SawhneySuman SarafRosen Sharma
    • G06F9/455
    • G06F21/50G06F21/74H04L63/20
    • A method in one example implementation includes receiving a plurality of command messages through a control channel and reconstructing the command messages to determine an intended command for one or more virtual machines on a server device. The command messages include one or more criteria and the intended command corresponds to an operation defined in a policy database. The method also includes determining whether the corresponding operation is permitted by comparing one or more policies associated with the operation to the one or more criteria. The method further includes sending the command messages to the server device if the operation is permitted. In more specific embodiments, the operation may include one of creating, cloning, deleting, starting, stopping, and modifying the one or more virtual machines.
    • 一个示例实现中的方法包括通过控制信道接收多个命令消息,并且重建命令消息以确定针对服务器设备上的一个或多个虚拟机的预期命令。 命令消息包括一个或多个标准,并且预期命令对应于在策略数据库中定义的操作。 该方法还包括通过将与操作相关联的一个或多个策略与一个或多个标准进行比较来确定是否允许相应的操作。 该方法还包括如果允许操作则将命令消息发送到服务器设备。 在更具体的实施例中,操作可以包括创建,克隆,删除,启动,停止和修改一个或多个虚拟机之一。
    • 2. 发明授权
    • System and method for managing virtual machine configurations
    • 用于管理虚拟机配置的系统和方法
    • US08544003B1
    • 2013-09-24
    • US12636414
    • 2009-12-11
    • Harvinder Singh SawhneySuman SarafRosen Sharma
    • Harvinder Singh SawhneySuman SarafRosen Sharma
    • G06F9/455G06F17/00G06F9/00G06F15/177G06F15/00G06F15/173
    • G06F21/50G06F21/74H04L63/20
    • A method in one example implementation includes receiving a plurality of command messages through a control channel and reconstructing the command messages to determine an intended command for one or more virtual machines on a server device. The command messages include one or more criteria and the intended command corresponds to an operation defined in a policy database. The method also includes determining whether the corresponding operation is permitted by comparing one or more policies associated with the operation to the one or more criteria. The method further includes sending the command messages to the server device if the operation is permitted. In more specific embodiments, the operation may include one of creating, cloning, deleting, starting, stopping, and modifying the one or more virtual machines.
    • 一个示例实现中的方法包括通过控制信道接收多个命令消息,并且重建命令消息以确定针对服务器设备上的一个或多个虚拟机的预期命令。 命令消息包括一个或多个标准,并且预期命令对应于在策略数据库中定义的操作。 该方法还包括通过将与操作相关联的一个或多个策略与一个或多个标准进行比较来确定是否允许相应的操作。 该方法还包括如果允许操作则将命令消息发送到服务器设备。 在更具体的实施例中,操作可以包括创建,克隆,删除,启动,停止和修改一个或多个虚拟机之一。
    • 3. 发明授权
    • Containment of network communication
    • 遏制网络通信
    • US07987230B2
    • 2011-07-26
    • US12839856
    • 2010-07-20
    • E. John SebesBakul ShahRosen Sharma
    • E. John SebesBakul ShahRosen Sharma
    • G06F15/16G06F15/173
    • H04L63/10
    • Invention selectively enables usage of services and communication conduits in a computer network, wherein the enablement is contingent on usage conditions, resulting in containment of the spread of unauthorized activity within a networked computer system and limiting the scope of results when an element becomes part of a hostile execution environment. Instead of protecting individual networked elements from a potentially hostile execution environment, the elements' usage of the networked environment is restricted to the extent of selectively allowing usage of needed resources explicitly authorized for use by such elements.
    • 发明选择性地使得能够在计算机网络中使用服务和通信管道,其中所述启用取决于使用条件,导致在联网的计算机系统内容纳未经授权的活动的扩展,并且当元素成为一部分时,限制结果的范围 敌对执行环境。 代替保护单个网络元素免受潜在的恶意执行环境的影响,元素对网络环境的使用被限制在选择性地允许使用明确授权使用这些元素的所需资源的范围。