会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • DYNAMIC SWITCHING OF SECURITY CONFIGURATIONS
    • 动态配置的动态切换
    • US20110047589A1
    • 2011-02-24
    • US12544745
    • 2009-08-20
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00G06F9/00
    • G06F21/6209
    • Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    • 公开了一种计算机实现的方法,计算机程序产品和用于切换安全配置的装置。 数据处理系统经由执行线程访问第一安全配置,其中安全配置包括至少一个安全参数。 线程接收传入请求。 线程根据接收到的请求,切换到第二个安全配置,根据传入请求指定资源。 该线程将第二安全配置或对第二安全配置的引用存储到堆栈。 该线程基于第二安全配置来认证传入请求。 线程授予或拒绝对资源的访问。 线程执行传入请求中引用的方法。 线程恢复到第一个安全配置,响应完成该方法。
    • 2. 发明授权
    • Dynamic switching of security configurations
    • 动态切换安全配置
    • US09292702B2
    • 2016-03-22
    • US12544745
    • 2009-08-20
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa A. FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00G06F21/62
    • G06F21/6209
    • Disclosed is a computer implemented method, computer program product, and apparatus to switch security configurations. A data processing system accesses a first security configuration via a thread of execution, wherein a security configuration comprises at least one security parameter. The thread receives an incoming request. The thread switches to a second security configuration that specifies a resource, based on the incoming request, responsive to receiving the incoming request. The thread stores the second security configuration or a reference to the second security configuration to a stack. The thread authenticates the incoming request based on the second security configuration. The thread grants or denies access to the resource. The thread executes a method referenced in the incoming request. The thread restores to a first security configuration, responsive to completing the method.
    • 公开了一种计算机实现的方法,计算机程序产品和用于切换安全配置的装置。 数据处理系统经由执行线程访问第一安全配置,其中安全配置包括至少一个安全参数。 线程接收传入请求。 线程根据接收到的请求,切换到第二个安全配置,根据传入请求指定资源。 该线程将第二安全配置或对第二安全配置的引用存储到堆栈。 该线程基于第二安全配置来认证传入请求。 线程授予或拒绝对资源的访问。 线程执行传入请求中引用的方法。 线程恢复到第一个安全配置,响应完成该方法。
    • 3. 发明授权
    • Flexibly assigning security configurations to applications
    • 灵活地将安全配置分配给应用程序
    • US08522307B2
    • 2013-08-27
    • US13413631
    • 2012-03-06
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • H04L9/00H04L9/32
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 4. 发明授权
    • Flexibly assigning security configurations to applications
    • 灵活地将安全配置分配给应用程序
    • US08230478B2
    • 2012-07-24
    • US12548767
    • 2009-08-27
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • H04L9/00H04L9/32
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 5. 发明申请
    • FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    • 灵活地将安全配置分配给应用程序
    • US20110055926A1
    • 2011-03-03
    • US12548767
    • 2009-08-27
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。