会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Security restrictions on binary behaviors
    • 对二进制行为的安全限制
    • US20050256960A1
    • 2005-11-17
    • US10836417
    • 2004-04-29
    • Shankar GaneshJohn Bedworth
    • Shankar GaneshJohn Bedworth
    • G06F15/16H04L29/06
    • H04L63/105
    • A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    • 安全模型基于识别的安全区域限制机器上的二进制行为。 二进制行为可以附加到文档,网页或电子邮件的元素。 二进制行为可能威胁到本地机器上的安全性。 安全管理员拦截下载请求和/或执行请求,识别所请求的二进制行为的安全区域,并限制基于安全区域的访问。 二进制行为可以根据相关URL识别安全区域。 在一个示例中,与安全区域相关联的所有二进制行为被相同地处理。 在另一个示例中,允许的二进制行为的列表与安全区域相关联,使得仅允许指定的二进制行为被访问。 在另一个示例中,不允许的二进制行为的列表与安全区域相关联,使得在列表中找到的二进制行为不能启动访问。
    • 8. 发明申请
    • Highlight Rendering Services Component For An Extensible Editor
    • 突出显示可扩展编辑器的渲染服务组件
    • US20060156231A1
    • 2006-07-13
    • US11276606
    • 2006-03-07
    • Ashraf MichailMark AlcazarJohn Bedworth
    • Ashraf MichailMark AlcazarJohn Bedworth
    • G06F17/24
    • G06F17/24
    • An extensible editor allows integration of extensions that modify the editor's default behavior and provide customized feedback to users. The editor includes interfaces through which extensions are connected to the editor and through which selection services and highlight rendering services are provided. The selection services interfaces provide a clear separation of a logical selection position in the document and the visual feedback provided for the selection, allowing extensions to be designed that provide customized selection feedback. The highlight rendering services interfaces provide an extension with the ability to augment an existing selection without modifying the actual document. The editor also includes an event routing model that works to decrease the occurrence of conflicts between the editor and extensions and between extensions. Upon the occurrence of an event, the editor routes the event to each extension before the editor's default handling of the event occurs. When an extension responds to an event, the extension may “consume” the event by indicating to the editor not to allow further processing of the event. After an event has been pre-processed by each extension, the default editor acts on the event. The editor then routes the event to each extension again, to allow each extension to process the event after the default editor has acted. When the post-processing is completed, each extension is notified of the actions taken by the editor and by each of the other extensions.
    • 可扩展的编辑器可以集成扩展,修改编辑器的默认行为,并向用户提供定制的反馈。 编辑器包括扩展连接到编辑器的接口,并提供选择服务和突出显示服务。 选择服务界面提供文档中的逻辑选择位置和为选择提供的视觉反馈的明确分离,允许设计提供定制选择反馈的扩展。 突出显示服务界面提供扩展功能,可以扩展现有选择,而无需修改实际文档。 编辑器还包括一个事件路由模型,可以减少编辑器和扩展之间以及扩展之间冲突的发生。 发生事件后,编辑器将在发生事件的默认处理之前将事件路由到每个扩展。 当分机响应事件时,分机可以通过向编辑器指示不允许进一步处理事件来“消耗”事件。 事件由每个扩展名预先处理后,默认编辑器对事件进行操作。 然后,编辑器再次将事件路由到每个扩展,以允许每个扩展在默认编辑器执行后处理事件。 当后期处理完成后,每个分机都被通知编辑者和其他每个分机所采取的行动。