会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method of replacing the identity of a file with another as part of a
file open request in a computer system
    • 在计算机系统中将文件的身份替换为文件打开请求的一部分的方法
    • US5701463A
    • 1997-12-23
    • US304098
    • 1994-09-09
    • Peter Bryan Malcolm
    • Peter Bryan Malcolm
    • G06F21/22G06F1/00G06F9/445G06F12/14G06F15/00G06F21/00G06F13/00
    • G06F21/6218G06F9/4425G06F2209/542Y10S707/959Y10S707/99953
    • In an improved method for accessing files in a computer system, file open requests are intercepted at the level of the operating system. The identity of the file to be opened is extracted from the request and a determination is made as to whether the identity of the requested file should be replaced with the identity of a substitute file to be opened instead of the requested file. If it is determined that the identity should be so replaced, the file open request is amended by substituting the identity of the substitute file for the identity of the requested file, and the request is passed on to its original destination for execution. This technique can be used to cause execution of a substitute program without the knowledge of the user. As an example, software metering can be implemented in a network system by substituting a different program from that requested when the number of copies of the requested program in use on the network has reached the maximum licensed number, so as to provide a user-friendly rejection of the program execution request.
    • 在用于访问计算机系统中的文件的改进方法中,文件打开请求在操作系统的级别被拦截。 从请求中提取要打开的文件的身份,并确定所请求的文件的身份是否应替换为要打开的替代文件的标识,而不是所请求的文件。 如果确定该身份应被如此替换,则通过将替换文件的身份替换为所请求的文件的身份来修改文件打开请求,并将该请求传递到其原始目的地以执行。 该技术可以用于在没有用户知识的情况下执行替代程序。 作为示例,当网络中使用的所请求的程序的副本数已经达到最大许可号时,可以在网络系统中实现软件测量,代替不同的程序,以便提供用户友好的 拒绝程序执行请求。
    • 7. 发明授权
    • Information management system
    • US07685626B2
    • 2010-03-23
    • US11127899
    • 2005-05-12
    • Peter Bryan Malcolm
    • Peter Bryan Malcolm
    • H04L9/00H04L9/32
    • G06F21/606G06F2221/2113G06Q10/10G06Q20/382G06Q30/06H04L51/12H04L51/14
    • An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyzer may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.
    • 8. 发明授权
    • Persistent data storage for data files of application data
    • 应用数据数据文件的持久数据存储
    • US08099394B2
    • 2012-01-17
    • US10534312
    • 2004-08-18
    • Peter Bryan Malcolm
    • Peter Bryan Malcolm
    • G06F17/30
    • G06F17/30085
    • A system for efficiently storing application data which allows a practically infinite number of physically separate storage devices to be used as archival storage means by one or more application programs. Application data is organized among the devices such that files with a similar expiry date (that is the date beyond which the files are no longer required to be archived) are grouped together on the same physical device, such that after the expiry date the device used for such files may be erased and re-used. Optionally, files with particular content-types may be grouped on the same physical device, or among physical devices of the same type.
    • 一种用于有效地存储应用数据的系统,其允许实际上无限数量的物理上分离的存储设备被一个或多个应用程序用作归档存储装置。 应用程序数据在设备之间组织,使得具有相似有效期限的文件(即不再需要归档文件的日期)在相同的物理设备上分组在一起,使得设备使用的到期日期 对于这样的文件可能会被擦除并重新使用。 可选地,具有特定内容类型的文件可以分组在相同的物理设备上,或者在相同类型的物理设备之间。
    • 9. 发明授权
    • Information management system
    • 信息管理系统
    • US07836482B2
    • 2010-11-16
    • US11127637
    • 2005-05-12
    • Peter Bryan Malcolm
    • Peter Bryan Malcolm
    • H04L9/00H04L9/32
    • G06F21/606G06F2221/2113G06Q10/10G06Q20/382G06Q30/06H04L51/12H04L51/14
    • An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyser, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyser may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.
    • 描述了一种信息管理系统,其包括运行应用以允许工作站的用户连接到诸如因特网的网络的一个或多个工作站。 每个应用程序都有一个分析器,它监视应用程序即将要发送到网络的传输数据,或者要监控从网络接收的传输数据,并确定要对传输数据采取的适当行动。 这样的动作可以是从数据库中存储的传输数据(例如密码和用户名,数字证书或电子商务交易细节)提取数据; 确保以与发送数据的内容相适应的加密强度发送发送数据; 确定是否需要检查在传输数据中接收到的数字证书是否有效,以及确定是否要由其中一个工作站的用户进行的事务在作出之前需要第三方批准。 分析仪可以查阅包含政策的政策数据来管理工作站,以便作出决定。 信息管理系统在电子商务环境中为在线贸易公司提供了许多优势,这些公司可以通过根据其在政策数据中的指示来规范工作人员的交易而受益,自动维护密码和业务记录 避免对数字证书的有效性进行不必要的检查,并确保员工的数据传输始终以商定的加密强度保护。
    • 10. 发明申请
    • Information Management System
    • US20080301761A1
    • 2008-12-04
    • US11958291
    • 2007-12-17
    • Peter Bryan Malcolm
    • Peter Bryan Malcolm
    • G06F21/00
    • G06Q10/10G06F21/606G06F21/6218G06F2221/2113G06Q10/06G06Q10/063G06Q20/3674G06Q20/382G06Q20/3821G06Q20/401G06Q20/4012G06Q30/06H04L51/12H04L51/14H04L63/20
    • An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made. The analyzer may consult a policy data containing a policy to govern the workstations in order to make its determination. The information management system provides many advantages in the eCommerce environment to on-line trading companies, who may benefit by being able to regulate the transactions made by their staff according to their instructions in a policy data, automatically maintain records of passwords and business conducted on-line, avoid paying for unnecessary checks on the validity of digital certificates and ensure that transmissions of data made by their staff are always protected at an agreed strength of encryption.