摘要:
A security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
摘要:
A method, a system, and a computer program product implements traffic shaping by processing as a synchronous request, tasks representing one or more units of work contained within the request. Before a request is sent through the network, the request is inspected in order to derive the amount of work that the request would generate in the network. A traffic manager queries the amount of work in that request compared to the amount of work that the network can support and generates a number of traffic envelopes. Based on the results of this query, “task pruning” may be implemented to break the request into smaller manageable task that fit into the traffic envelopes. Task pruning may also enable only a subset of the work to be performed. Thus, a measure of the amount of work, rather than the amount of data, within a request is considered when scheduling the request.
摘要:
A method, a system, and a computer program product implements traffic shaping by processing as a synchronous request, tasks representing one or more units of work contained within the request. Before a request is sent through the network, the request is inspected in order to derive the amount of work that the request would generate in the network. A traffic manager queries the amount of work in that request compared to the amount of work that the network can support and generates a number of traffic envelopes. Based on the results of this query, “task pruning” may be implemented to break the request into smaller manageable task that fit into the traffic envelopes. Task pruning may also enable only a subset of the work to be performed. Thus, a measure of the amount of work, rather than the amount of data, within a request is considered when scheduling the request.
摘要:
A confidential content search engine method is provided. With the method, a security compliance search engine is provided for searching one or more client computing devices for items of information that meet a security criteria identifying items of information containing confidential content. Results of the search are provided to an analysis engine for determining if the items of information identified by the search are being maintained in accordance with a security policy for ensuring the confidentiality of the confidential content. Results of the analysis may be used to generate a report or log and to generate a notification to the client computing device identifying any violations of the security policy and possible solutions for bringing the item of information into compliance with the security policy. In addition, an administrator may be notified of any violations so that corrective action may be taken.
摘要:
A method for sharing subscriptions to the content of a resource list includes creating a first subscription to the content of the resource list upon receipt of a first subscription request for the presence state of the list from a first user; receiving a second presence subscription request for the resource list from a second user; sending a one-time request with the identity of the second subscribing user to an XCAP server; receiving an authorization response related to the one-time request; and creating a super user subscription to the content of the resource list, the super user subscription used to provide presence state information about the list members to the first user and the second user.
摘要:
A Universal TAI handles multiple identifications by means of an internal lookup table. When authenticating and authorizing requests, from a pre-registered customer, that are serviced by an application server, a reverse proxy security server receives requests of different protocols and associates user identification information of a single user with different formats based on the types and protocols of the requests. The Universal TAI determines a fundamental identification of the user from a lookup table, substitutes the fundamental identification into the requests of different protocols for the same user principal, and passes the request with the fundamental identification to the application server.
摘要:
A method for sharing subscriptions to the content of a resource list includes creating a first subscription to the content of the resource list upon receipt of a first subscription request for the presence state of the list from a first user; receiving a second presence subscription request for the resource list from a second user; sending a one-time request with the identity of the second subscribing user to an XCAP server; receiving an authorization response related to the one-time request; and creating a super user subscription to the content of the resource list, the super user subscription used to provide presence state information about the list members to the first user and the second user.
摘要:
A system for communicating between networked applications and vehicles that includes a vehicle response server and a vehicle response agent. The vehicle response server can manage communications between at least one vehicle and at least one application remotely located from the vehicle, wherein the application can provide activation contexts to the vehicle. The vehicle response agent can be disposed in the vehicle. The vehicle response agent can receive the activation contexts and determine event occurrences based in part upon the activation contexts and in part upon a location of the vehicle relative to previously defined geographical boundaries specified by the vehicle response server.
摘要:
A Universal TAI handles multiple identifications by means of an internal lookup table. When authenticating and authorizing requests, from a pre-registered customer, that are serviced by an application server, a reverse proxy security server receives requests of different protocols and associates user identification information of a single user with different formats based on the types and protocols of the requests. The Universal TAI determines a fundamental identification of the user from a lookup table, substitutes the fundamental identification into the requests of different protocols for the same user principal, and passes the request with the fundamental identification to the application server.
摘要:
A system for communicating between networked applications and vehicles that includes a vehicle response server and a vehicle response agent. The vehicle response server can manage communications between at least one vehicle and at least one application remotely located from the vehicle, wherein the application can provide activation contexts to the vehicle. The vehicle response agent can be disposed in the vehicle. The vehicle response agent can receive the activation contexts and determine event occurrences based in part upon the activation contexts and in part upon a location of the vehicle relative to previously defined geographical boundaries specified by the vehicle response server.