会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • ISOLATED EXECUTION LOCATION
    • 隔离执行位置
    • WO1998008163A1
    • 1998-02-26
    • PCT/IB1997000973
    • 1997-08-07
    • APM LIMITEDBULL, John, AlbertOTWAY, David, JohnKRAMER, Andre
    • APM LIMITED
    • G06F09/46
    • G06F9/46G06F9/44589G06F21/53G06F2211/009
    • The present invention provides an end user computer system programmed to operate in response to an imported data stream containing or having associated therewith one or more mobile program components from an external source, characterised in that: a) the incoming data stream is screened to identify mobile program components within or associated with that data stream; b) a selected some or all of the mobile program components are passed to one or more program execution locations selectively isolated from or within the end user system prior to being executed to operate in a desired manner; c) the execution location is one in which one or more of the selected program components are retained and which has one or more interfaces with the external source of the data stream and one or more interfaces with the end user system whereby program component(s) within the execution location can be executed within the execution location to interact with the external source of data and/or the data and/or a program held by the end user system; and d) the operation of the interface(s) between the execution location and the end user system are programmed so that only data which has been interacted on by the program component(s) within the execution location in a specified and controlled manner and/or program components which operate in a specified manner can be passed to and from the end user system.
    • 本发明提供一种终端用户计算机系统,其被编程为响应于从外部源包含或与其相关联的一个或多个移动节目组件的导入数据流进行操作,其特征在于:a)输入数据流被筛选以识别移动 在该数据流内或与该数据流相关联的程序组件; b)所选择的一些或所有移动节目组件在被执行以期望的方式操作之前被传递到选择性地与最终用户系统隔离或在最终用户系统内的一个或多个程序执行位置; c)执行位置是其中一个或多个所选程序组件被保留并且与数据流的外部源的一个或多个接口以及与最终用户系统的一个或多个接口的执行位置,其中程序组件 执行位置内的执行位置可以在执行位置内执行以与外部的数据源和/或数据和/或终端用户系统所保存的程序进行交互; 以及d)执行位置和最终用户系统之间的接口的操作被编程,使得只有由执行位置内的程序组件以规定和受控的方式进行交互的数据和/ 或以指定方式操作的程序组件可以被传递到终端用户系统或从终端用户系统传递。
    • 4. 发明申请
    • A SYSTEM AND METHOD FOR EXECUTING INTERACTIVE APPLICATIONS WITH MINIMAL PRIVILEGES
    • 用最小特权执行互动应用的系统和方法
    • WO2006014210A1
    • 2006-02-09
    • PCT/US2005/020171
    • 2005-06-08
    • CITRIX SYSTEMS, INC.KRAMER, Andre
    • KRAMER, Andre
    • G06F1/00
    • G06F21/52Y10S707/99939
    • A mechanism for running interactive applications with a minimal set of privileges is disclosed. The privileges form a subset of the privileges afforded to the user requesting the application and are allocated consistent with the principle of least privilege. The application runs with the minimal amount of 10 permissions necessary to accomplish its assigned tasks. A new user account is created and provisioned or identified for each application to which a user requests access. The accounts have a subset or superset of the access rights and operating system privileges that the user who is logged on to the system and requesting access to the application ordinarily enjoys. The subset/superset of the user's privileges is determined by a policy-based decision system. The policy-based decision system makes its determination based on an analysis of the application requirements, an analysis of the data security and privacy concerns associated with the execution of the application, the identity of the user and user's role and any other policy considerations previously specified by an administrator. Once the determination as to the appropriate set of privileges to be afforded in the execution environment has been made, the execution environment is created and provisioned or a pre-existing execution environment possessing the requisite privileges is identified and the remote user is logged into the server-side account. The application-specific accounts may be audited by audit trail tools that provide evidence of policy enforcement.
    • 公开了一种以最小权限集运行交互式应用程序的机制。 权限形成了向用户请求应用程序提供的权限的一部分,并且被分配与最小权限的原则一致。 应用程序以完成其分配任务所需的最少10个权限运行。 为用户请求访问的每个应用程序创建和配置或标识新的用户帐户。 这些帐户具有访问权限和操作系统权限的子集或超集,用户登录到系统并请求对应用程序的访问通常享有权限。 用户权限的子集/超集由基于策略的决策系统确定。 基于策略的决策系统基于对应用需求的分析,与应用的执行相关的数据安全性和隐私问题的分析,用户的身份和用户的角色以及先前指定的任何其他策略考虑 由管理员。 一旦确定了在执行环境中提供的适当权限集合,就会创建和配置执行环境,或者识别拥有必需权限的预先存在的执行环境,并且远程用户登录到服务器 边帐户 特定于应用程序的帐户可以通过审计跟踪工具进行审计,这些工具提供了政策执行的证据。