Condition based authorization model for data access
    1.
    发明申请
    Condition based authorization model for data access 审中-公开
    用于数据访问的基于条件的授权模型

    公开(公告)号:US20080127354A1

    公开(公告)日:2008-05-29

    申请号:US11605030

    申请日:2006-11-28

    IPC分类号: G06F21/00

    摘要: A condition-based authorization model for data access is provided. According to the model, the owner of a securable software object, such as a file, folder, or process, may specify a security policy that includes an access condition for accessing the object. The access condition may be based on dynamic user or system state information having a value that is updatable while a user is logged on, such as system time or user location. When a later request is received from a user to perform an action on the object via an application programming interface of a computer operating system, a security subsystem of the computer operating system queries a system resource containing information suitable to evaluate the access condition, and determines whether the access condition is met. If the access condition is met, access by the user to the securable software object is permitted. Otherwise, access is denied.

    摘要翻译: 提供了一种基于条件的数据访问授权模型。 根据该模型,安全软件对象(诸如文件,文件夹或进程)的所有者可以指定包括访问对象的访问条件的安全策略。 访问条件可以基于具有在用户登录时可更新的值的动态用户或系统状态信息,诸如系统时间或用户位置。 当从用户接收到通过计算机操作系统的应用编程接口对对象执行动作的稍后请求时,计算机操作系统的安全子系统查询包含适于评估访问条件的信息的系统资源,并且确定 是否满足访问条件。 如果访问条件满足,则允许用户访问安全的软件对象。 否则访问被拒绝。

    Configuration Creation for Deployment and Monitoring
    2.
    发明申请
    Configuration Creation for Deployment and Monitoring 有权
    用于部署和监视的配置创建

    公开(公告)号:US20100180221A1

    公开(公告)日:2010-07-15

    申请号:US12353881

    申请日:2009-01-14

    IPC分类号: G06F3/048 G06F17/30

    CPC分类号: G06F3/0481 G06F17/30371

    摘要: A configuration management and monitoring system may use a hierarchical knowledge base to identify configuration settings, resolve conflicts between configuration settings, and implement and monitor the configuration settings for one or more devices in a network environment. The system may produce a file that may be consumed by an application and with which the application may be configured to conform to the configuration settings. The system may also produce a set of settings that may be used to automate deployment and monitor compliance with the settings.

    摘要翻译: 配置管理和监视系统可以使用分层知识库来识别配置设置,解决配置设置之间的冲突,并且实现和监视网络环境中的一个或多个设备的配置设置。 该系统可以产生可由应用程序消耗的文件,并且应用程序可以配置该文件以符合配置设置。 系统还可以产生一组设置,这些设置可用于自动部署和监视与设置的一致性。

    Configuration creation for deployment and monitoring
    5.
    发明授权
    Configuration creation for deployment and monitoring 有权
    用于部署和监视的配置创建

    公开(公告)号:US08701047B2

    公开(公告)日:2014-04-15

    申请号:US12353881

    申请日:2009-01-14

    IPC分类号: G06F3/048

    CPC分类号: G06F3/0481 G06F17/30371

    摘要: A configuration management and monitoring system may use a hierarchical knowledge base to identify configuration settings, resolve conflicts between configuration settings, and implement and monitor the configuration settings for one or more devices in a network environment. The system may produce a file that may be consumed by an application and with which the application may be configured to conform to the configuration settings. The system may also produce a set of settings that may be used to automate deployment and monitor compliance with the settings.

    摘要翻译: 配置管理和监视系统可以使用分层知识库来识别配置设置,解决配置设置之间的冲突,并且实现和监视网络环境中的一个或多个设备的配置设置。 该系统可以产生可由应用程序消耗的文件,并且应用程序可以配置该文件以符合配置设置。 系统还可以产生一组设置,这些设置可用于自动部署和监视与设置的一致性。

    Systems and methods for using machine attributes to deter software piracy in an enterprise environment
    8.
    发明授权
    Systems and methods for using machine attributes to deter software piracy in an enterprise environment 有权
    使用机器属性来阻止企业环境中软件盗版的系统和方法

    公开(公告)号:US07644442B2

    公开(公告)日:2010-01-05

    申请号:US11089071

    申请日:2005-03-24

    IPC分类号: G06F7/04 G06F21/00

    摘要: A method, system and computer-readable medium for deterring software piracy in a volume license environment. A volume license key embedded within a volume license file is received. The volume license key has first data derived from at least one machine attribute of the environment. The volume license file is authenticated using second data derived from at least one machine attribute of the environment. A software package associated with the volume license key is then activated on at least one computing device in the environment.

    摘要翻译: 一种用于在卷许可证环境中阻止软件盗版的方法,系统和计算机可读介质。 收到卷许可证文件中嵌入的卷许可证密钥。 卷许可证密钥具有从环境的至少一个机器属性导出的第一数据。 使用从环境的至少一个机器属性导出的第二数据来对卷许可证文件进行身份验证。 然后在环境中的至少一个计算设备上激活与卷许可证密钥相关联的软件包。

    Systems and methods for deterring software piracy in a volume license environment
    9.
    发明授权
    Systems and methods for deterring software piracy in a volume license environment 有权
    用于在卷许可证环境中阻止软件盗版的系统和方法

    公开(公告)号:US07356709B2

    公开(公告)日:2008-04-08

    申请号:US10356225

    申请日:2003-01-31

    CPC分类号: G06F21/121

    摘要: A unique volume license key (VLK) is provided to a volume license holder. A signed file containing the VLK and the data derived from volume license holder's submitted computing environment information is provided to the volume license holder along with the licensed software. The license file is stored in a central location, such as on an installation server, or locally on client machines, in a rather large file of any type. Upon logon, the license file is read, the data authenticated and the system is activated. If license data cannot be authenticated, a connected system either fully functions in grace period or run in reduced functionality mode until authentication succeeds. If the system is disconnected, the system is functional only with disconnected features until it joins a network again. In a completely off-line installation, the license file is generated by the volume license holder using software vendor assigned specific VLK and software vendor provided security hardware device. The distribution methods of software package, the VLK, and the license file can be flexible, including, but not limited to, single or multiple media.

    摘要翻译: 向卷许可证持有者提供了唯一的卷许可证密钥(VLK)。 包含VLK的签名文件和从卷许可证持有者提交的计算环境信息导出的数据与许可软件一起提供给卷许可证持有者。 许可证文件存储在中央位置,例如安装服务器上,或存储在客户端计算机上的本地的任何类型的相当大的文件中。 登录后,许可证文件被读取,数据被认证并且系统被激活。 如果许可证数据无法验证,则连接的系统可以在宽限期内完全运行,也可以以缩减的功能模式运行,直到认证成功。 如果系统断开连接,系统仅在断开功能时才起作用,直到它再次加入网络。 在完全离线安装中,许可证文件由卷许可证持有者使用软件供应商分配的特定VLK和软件供应商提供的安全硬件设备生成。 软件包,VLK和许可证文件的分发方法可以是灵活的,包括但不限于单个或多个媒体。