摘要:
A computer controlled implementation for distributing portions of a license to use software entities, granted by a licensor to a primary licensee, to subsequent secondary licensees comprising determining a dividable value for the primary license to use a software entity, enabling the primary licensee to grant a portion of the dividable value of the primary license to use the software entity to a secondary licensee, enabling the licensor, the licensee and the secondary licensee to add value to said values of the licenses and tracking said value of the license and of the portion granted to said secondary licensee.
摘要:
A computer controlled implementation for distributing portions of a license to use software entities, granted by a licensor to a primary licensee, to subsequent secondary licensees comprising determining a dividable value for the primary license to use a software entity, enabling the primary licensee to grant a portion of the dividable value of the primary license to use the software entity to a secondary licensee, enabling the licensor, the licensee and the secondary licensee to add value to said values of the licenses and tracking said value of the license and of the portion granted to said secondary licensee.
摘要:
A secure object manager obtains, from an authorized person, a specification for disposition of at least one object, and creates first instructions, pertaining to the disposition, for a remote secure-object agent on a remote system. A copy of the object and the first instructions are sent to a remote secure-object agent on a remote system, which controls the copy based on the first instructions.
摘要:
A secure object manager obtains, from an authorized person, a specification for disposition of at least one object, and creates first instructions, pertaining to the disposition, for a remote secure-object agent on a remote system. A copy of the object and the first instructions are sent to a remote secure-object agent on a remote system, which controls the copy based on the first instructions.
摘要:
Techniques are disclosed for controlling software patching activity. Techniques may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted. Patching may be performed when convenient; or just before when the software requiring the patch is needed; or patching may be blocked to prevent unwanted software characteristics and/or behavior. Patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. A particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.
摘要:
A computer system having at least one CPU has as its only interface with the Internet and other external sources a virtual machine that contains a browser and/or other communications programs, so that e-mail and other external communications are opened within the virtual machine and stored within a virtual storage. The virtual machine is erased at frequent intervals, taking with it any changes made by virus or other hostile programs.
摘要:
The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. In still further circumstances, a particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.
摘要:
The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.
摘要:
A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.
摘要:
A system and method for implementing a customer incentive program that conditionally rewards a customer based upon the customer's movement through a shopping area and/or responses to questions which refer to the shopping area, sections of the shopping area and/or products located in the shopping area. While moving through a shopping area, a customer is monitored using a customer tracking system and/or presented with questions using a customer interface device. The customer is rewarded based upon the nature of the customer's movements and/or the nature of the customer's responses. The customer incentive program is designed to expose a customer to particular sections of a shopping area or specified products in the shopping area in order to motivate customer impulse buying.