会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Flexibly assigning security configurations to applications
    • 灵活地将安全配置分配给应用程序
    • US08522307B2
    • 2013-08-27
    • US13413631
    • 2012-03-06
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • H04L9/00H04L9/32
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 8. 发明申请
    • FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    • 灵活地将安全配置分配给应用程序
    • US20120198515A1
    • 2012-08-02
    • US13413631
    • 2012-03-06
    • PAUL W. BENNETTElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • PAUL W. BENNETTElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 9. 发明授权
    • Flexibly assigning security configurations to applications
    • 灵活地将安全配置分配给应用程序
    • US08230478B2
    • 2012-07-24
    • US12548767
    • 2009-08-27
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • H04L9/00H04L9/32
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。
    • 10. 发明申请
    • FLEXIBLY ASSIGNING SECURITY CONFIGURATIONS TO APPLICATIONS
    • 灵活地将安全配置分配给应用程序
    • US20110055926A1
    • 2011-03-03
    • US12548767
    • 2009-08-27
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • Paul W. BennettElisa FerracaneDaniel E. MorrisMichael C. Thompson
    • G06F21/00
    • H04L63/104G06F21/335
    • A method, system, and computer usable program product for flexibly assigning security configurations to applications are provided in the illustrative embodiments. An embodiment determines, forming a first determination, whether a first identifier identifying the application is mapped to the security configuration. The embodiment determines, forming a second determination, whether the application participates in a group by determining whether a second identifier identifying the group is mapped to the security configuration. The embodiment assigns, forming a first assignment, the security configuration to the application if either of the first and the second determinations is true. The embodiment assigns, forming a second assignment, the security configuration to the application using a determination by a first policy if the first and the second determinations are false.
    • 在说明性实施例中提供了用于将安全配置灵活地分配给应用的方法,系统和计算机可用程序产品。 实施例确定形成第一确定,识别应用的第一标识符是否映射到安全配置。 该实施例通过确定标识组的第二标识符是否映射到安全配置来确定应用程序是否参与组,确定第二确定。 如果第一和第二确定中的任一个为真,则该实施例将安全配置分配给应用程序。 如果第一和第二确定是假的,则该实施例使用第一策略的确定来将安全配置分配给应用。