IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT
    26.
    发明申请
    IDENTITY MANAGEMENT IN A NETWORKED COMPUTING ENVIRONMENT 有权
    网络计算环境中的身份管理

    公开(公告)号:US20160269499A1

    公开(公告)日:2016-09-15

    申请号:US15163983

    申请日:2016-05-25

    Abstract: An approach for user identity management in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, historical command usage within a server environment is analyzed to determine the characteristics of the commands being run against a cloud resource to determine with a confidence rating the likelihood the commands are being executed by a certain user. Such an approach allows for more efficient user identity management in order to optimize cloud security and system administration.

    Abstract translation: 提供了一种用于虚拟化/联网(例如,云)计算环境中的用户身份管理的方法。 在典型的实施例中,分析服务器环境内的历史命令使用以确定针对云资源运行的命令的特性,以确定命中由某个用户执行的可能性的置信度。 这种方法允许更有效的用户身份管理,以优化云安全性和系统管理。

    INTELLIGENT SECURITY ANALYSIS AND ENFORCEMENT FOR DATA TRANSFER
    27.
    发明申请
    INTELLIGENT SECURITY ANALYSIS AND ENFORCEMENT FOR DATA TRANSFER 有权
    智能安全分析和执行数据传输

    公开(公告)号:US20150324593A1

    公开(公告)日:2015-11-12

    申请号:US14274167

    申请日:2014-05-09

    Abstract: An approach is provided for managing a message in a transfer from a computer. A level of sensitivity of data in a payload of the message is determined. A level of security protecting the transfer of the data is determined. Based on the level of sensitivity, the level of security is determined to satisfy or not satisfy a threshold level. If the level of security satisfies the threshold level, the computer is connected and the message is transferred using the level of security. If the level of security does not satisfy the threshold level, then based on the levels of sensitivity and security, an action to change the level of security is determined so that the changed level of security satisfies the threshold level. The action is executed to connect the computer and transfer the message using the changed level of security.

    Abstract translation: 提供了一种用于管理来自计算机的传送中的消息的方法。 确定消息的有效载荷中的数据的灵敏度级别。 确定保护数据传输的安全级别。 基于灵敏度级别,确定安全级别以满足或不满足阈值级别。 如果安全级别达到阈值级别,则计算机连接,并且使用安全级别传输消息。 如果安全级别不满足阈值级别,则基于灵敏度和安全级别,确定改变安全级别的动作,使得安全级别的变化满足阈值级别。 执行该操作以连接计算机并使用更改的安全级别传输消息。

    CLOUD RESOURCE CLONING BASED ON COLLABORATIVE CONTENT
    28.
    发明申请
    CLOUD RESOURCE CLONING BASED ON COLLABORATIVE CONTENT 有权
    基于协同内容的云资源克隆

    公开(公告)号:US20150101017A1

    公开(公告)日:2015-04-09

    申请号:US14049553

    申请日:2013-10-09

    CPC classification number: H04L63/10 H04L41/5061 H04L41/5064 H04L67/10 H04W4/60

    Abstract: An approach for facilitating collaborative support to a user in a networked computing environment (e.g., a cloud computing environment) is provided. In one aspect, specifications that describe a networked resource (e.g., a cloud resource) are retrieved. A set of preferences that specify a set of collaborators and a set of access limitations for the set of collaborators with respect to the networked resource are gathered in response to a request for help by a user. Also in response to the request, a clone of the networked resource is created. A collaborator from the set of collaborators is granted access to clone the networked resource having the set of access limitations. The collaborator can access the clone of the networked resource (e.g., to provide support to the user) until a terminating condition is met, at which time the collaborators' access to the clone is terminated.

    Abstract translation: 提供了一种用于在网络计算环境(例如,云计算环境)中促进对用户的协作支持的方法。 在一个方面,检索描述网络资源(例如,云资源)的规范。 响应于用户的帮助请求,收集指定一组协作者的一组偏好以及针对联网的资源的一组协作者的一组访问限制。 另外,响应该请求,创建联网资源的克隆。 来自该组合作者的协作者被授予访问权以克隆具有一组访问限制的联网资源。 协作者可以访问联网资源的克隆(例如,为用户提供支持),直到满足终止条件,此时协作者对克隆的访问被终止。

    AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT
    29.
    发明申请
    AUTHORIZING AN ACTION REQUEST IN A NETWORKED COMPUTING ENVIRONMENT 审中-公开
    授权在网络计算环境中的行动请求

    公开(公告)号:US20140359110A1

    公开(公告)日:2014-12-04

    申请号:US13909127

    申请日:2013-06-04

    CPC classification number: H04L47/70 G06F9/50

    Abstract: An approach for authorizing an action requested by a user in a networked computing environment (e.g., a cloud computing environment) is provided. In a typical embodiment, a request for a particular action associated with a computing resource is received. The connected systems which may be affected by the requested action are identified. The actual users of the connected systems are determined. A response from each of the actual users is requested. The responses are collected and weighted to determine if authorization for the requested action is granted.

    Abstract translation: 提供了一种用于授权用户在网络计算环境(例如,云计算环境)中请求的动作的方法。 在典型的实施例中,接收与计算资源相关联的特定动作的请求。 识别可能受到请求动作影响的连接系统。 确定连接系统的实际用户。 请求来自每个实际用户的响应。 收集和加权回复以确定是否授予所请求的操作的授权。

    REPLICATION OF CONTENT TO ONE OR MORE SERVERS
    30.
    发明申请
    REPLICATION OF CONTENT TO ONE OR MORE SERVERS 审中-公开
    将内容复制到一个或多个服务器

    公开(公告)号:US20140330782A1

    公开(公告)日:2014-11-06

    申请号:US13875839

    申请日:2013-05-02

    Abstract: An approach is provided to automatically replicate content to certain servers in a networking environment based on, amongst other metrics, location of third parties accessing information in a social networking environment. The approach includes obtaining content from a user within a networked environment and analyzing information of one or more third parties that have access to the networked environment and who have an association with the user. The approach further includes replicating the content to one or more servers within the networked environment based on the analyzed information of the one or more third parties.

    Abstract translation: 提供了一种方法,用于基于在社交网络环境中访问信息的第三方的位置以及其他指标,在网络环境中自动复制内容到某些服务器。 该方法包括从网络环境中的用户获得内容,并分析访问网络环境并与用户具有关联性的一个或多个第三方的信息。 该方法还包括基于所分析的一个或多个第三方的信息将内容复制到联网环境中的一个或多个服务器。

Patent Agency Ranking