会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Portable virtual systems for composite solutions
    • 复合解决方案的便携式虚拟系统
    • US09100399B2
    • 2015-08-04
    • US13538164
    • 2012-06-29
    • Ronald P. DoyleIndrajit PoddarYi-Hsiu H. Wei
    • Ronald P. DoyleIndrajit PoddarYi-Hsiu H. Wei
    • G06F15/173H04L29/08
    • H04L67/10
    • A mechanism is provided in a data processing system for providing portable composite solutions. The mechanism deploys a set of virtual images for a plurality of components of a composite solution to a build environment to form a set of virtual machines. The mechanism deploys a network virtual image to the build environment to form a network virtual machine. The network virtual machine comprises a router. The mechanism configures the router to create a private subnet with a set of fixed addresses and set of host names for the composite solution. Optionally, the mechanism may discover the fixed addresses during the build phase. The mechanism optionally installs middleware components to the set of virtual machines for the composite solution to form a set of solution virtual machines. The mechanism captures the set of solution virtual machines as a set of solution virtual images as a portable composite solution.
    • 在用于提供便携式复合解决方案的数据处理系统中提供了一种机制。 该机制将组合解决方案的多个组件的一组虚拟映像部署到构建环境以形成一组虚拟机。 该机制将网络虚拟映像部署到构建环境以形成网络虚拟机。 网络虚拟机包括路由器。 该机制配置路由器以创建具有一组固定地址和复合解决方案主机名集的专用子网。 可选地,该机制可以在构建阶段期间发现固定地址。 该机制可选择将中间件组件安装到组合解决方案的一组虚拟机中以形成一组解决方案虚拟机。 该机制将一组解决方案虚拟机作为一组解决方案虚拟映像捕获为便携式复合解决方案。
    • 2. 发明申请
    • Portable Virtual Systems for Composite Solutions
    • 复合解决方案的便携式虚拟系统
    • US20140003284A1
    • 2014-01-02
    • US13538164
    • 2012-06-29
    • Ronald P. DoyleIndrajit PoddarYi-Hsiu H. Wei
    • Ronald P. DoyleIndrajit PoddarYi-Hsiu H. Wei
    • H04L12/28
    • H04L67/10
    • A mechanism is provided in a data processing system for providing portable composite solutions. The mechanism deploys a set of virtual images for a plurality of components of a composite solution to a build environment to form a set of virtual machines. The mechanism deploys a network virtual image to the build environment to form a network virtual machine The network virtual machine comprises a router. The mechanism configures the router to create a private subnet with a set of fixed addresses and set of host names for the composite solution. Optionally, the mechanism may discover the fixed addresses during the build phase. The mechanism optionally installs middleware components to the set of virtual machines for the composite solution to form a set of solution virtual machines. The mechanism captures the set of solution virtual machines as a set of solution virtual images as a portable composite solution.
    • 在用于提供便携式复合解决方案的数据处理系统中提供了一种机制。 该机制将组合解决方案的多个组件的一组虚拟映像部署到构建环境以形成一组虚拟机。 该机制将网络虚拟映像部署到构建环境以形成网络虚拟机。网络虚拟机包括路由器。 该机制配置路由器以创建具有一组固定地址和复合解决方案主机名集的专用子网。 可选地,该机制可以在构建阶段期间发现固定地址。 该机制可选择将中间件组件安装到组合解决方案的一组虚拟机中以形成一组解决方案虚拟机。 该机制将一组解决方案虚拟机作为一组解决方案虚拟映像捕获为便携式复合解决方案。
    • 3. 发明授权
    • Virtual roles
    • 虚拟角色
    • US08887241B2
    • 2014-11-11
    • US11359212
    • 2006-02-22
    • Kathryn H. BrittonDieter BuehlerWilliam P. HigginsYi-Hsiu H. WeiChunhui Yang
    • Kathryn H. BrittonDieter BuehlerWilliam P. HigginsYi-Hsiu H. WeiChunhui Yang
    • H04L29/06G06F21/62
    • G06F21/629
    • Embodiments of the present invention address deficiencies of the art in respect to access control and provide a method, system and computer program product for access control management for a composite application. In a first embodiment, a method for role-based access control management for a composite application can be provided. The method can include selecting a component for deployment in a composite application and parsing a security policy for the component to identify a mapping between a specific role for the component and a virtual role for the composite application. Binding logic can be generated from the security policy and the component can be deployed into the composite application. Finally, security access operations for the virtual role can be processed through method calls to operations defined in the binding logic.
    • 本发明的实施例解决了本领域在访问控制方面的缺陷,并提供了一种用于组合应用的访问控制管理的方法,系统和计算机程序产品。 在第一实施例中,可以提供用于复合应用的基于角色的访问控制管理的方法。 该方法可以包括选择用于在复合应用程序中部署的组件并解析组件的安全策略,以识别组件的特定角色与复合应用程序的虚拟角色之间的映射。 绑定逻辑可以从安全策略生成,组件可以部署到组合应用程序中。 最后,可以通过对绑定逻辑中定义的操作的方法调用来处理虚拟角色的安全访问操作。