Using rich pointers to reference tokens
    91.
    发明授权
    Using rich pointers to reference tokens 有权
    使用丰富的指针来引用令牌

    公开(公告)号:US07694131B2

    公开(公告)日:2010-04-06

    申请号:US11537019

    申请日:2006-09-29

    IPC分类号: H04L29/06 G06F21/00

    CPC分类号: H04L63/0807

    摘要: Providing reference tokens. A method includes receiving a request for a token. In response to the request for a token and in place of a token, one or more rich pointers are sent referencing one or more tokens. The rich pointers point to locations where one or more actual tokens can be retrieved. When only a single pointer is sent, the pointer is a reference other than an HTTP URL.

    摘要翻译: 提供引用令牌。 一种方法包括接收对令牌的请求。 响应于令牌的请求并代替令牌,发送一个或多个富指针,引用一个或多个令牌。 丰富的指针指向可以检索一个或多个实际令牌的位置。 当只发送一个指针时,该指针是HTTP URL以外的引用。

    Mapping between anonymous modules in a network environment
    92.
    发明授权
    Mapping between anonymous modules in a network environment 有权
    映射网络环境中的匿名模块

    公开(公告)号:US07693807B2

    公开(公告)日:2010-04-06

    申请号:US11304298

    申请日:2005-12-15

    IPC分类号: G06N5/00 G06F17/00

    CPC分类号: G06F9/546

    摘要: The present invention extends to methods, systems, and computer program products for mapping between anonymous modules in an event environment. Through the use of one or more event type to executable module bindings, a binding/dispatch manager maps events, for example, peer-to-peer, grid, or parallel processing computing events, to appropriate methods for processing the events. When an event is received from an event infrastructure, the binding/dispatch manager refers to annotations (e.g., based on the shape of the parameters) to identify an appropriate method for processing the event. Parameters are transferred to the appropriate method, which processes the parameters and returns any results to the binding/dispatch manager. In some embodiments, the binding/dispatch manager then forwards a response to the event infrastructure.

    摘要翻译: 本发明扩展到用于在事件环境中的匿名模块之间进行映射的方法,系统和计算机程序产品。 通过将一个或多个事件类型用于可执行模块绑定,绑定/分派管理器将事件(例如,对等,网格或并行处理计算事件)映射到用于处理事件的适当方法。 当从事件基础设施接收到事件时,绑定/调度管理器引用注释(例如,基于参数的形状)来标识用于处理事件的适当方法。 参数传递到适当的方法,该方法处理参数并将任何结果返回给绑定/调度管理器。 在一些实施例中,绑定/调度管理器然后将响应转发到事件基础设施。

    Valid transformation expressions for structured data
    93.
    发明授权
    Valid transformation expressions for structured data 有权
    结构化数据的有效转换表达式

    公开(公告)号:US07640260B2

    公开(公告)日:2009-12-29

    申请号:US11299428

    申请日:2005-12-12

    IPC分类号: G06F7/00 G06F17/00

    摘要: Structuring a data structure that is of a particular type that has a particular schema used for validation, in a manner that permits selected components of the data structure to be optionally transformed while retaining the ability to validate the data structure. The data structure includes information that is sufficient to identify one or more transformations that may occur on at least one component of the data structure while still being valid.

    摘要翻译: 以允许可选择地转换数据结构的所选组件同时保留验证数据结构的能力的方式来构造具有用于验证的特定模式的特定类型的数据结构。 数据结构包括足以识别可能在数据结构的至少一个组件上仍然有效的一个或多个变换的信息。

    Hidden proactive replication of data
    94.
    发明授权
    Hidden proactive replication of data 失效
    隐藏主动复制数据

    公开(公告)号:US07631359B2

    公开(公告)日:2009-12-08

    申请号:US10289988

    申请日:2002-11-06

    IPC分类号: G06F21/00 H04L9/00

    CPC分类号: G06F21/6272

    摘要: Moving replicas in a cryptographically secure manner such that the target location and timing of the movements are completely hidden from any user, or is kept as a secret by a limited number of users who have been given advanced notice of the new location and relocation time for a replica. A catalog of replica locations that describe the current location of the replicas is stored in encrypted form so as to prevent individuals from determining the exact location of the replicas. Since the location of the replicas is hidden at any given moment, attackers may not use the location of the replicas in order to attack all of the replicas at the same time. Accordingly, recovery mechanisms may have an opportunity to recover from any given attack by once again creating replicas from those replicas that had not been attacked.

    摘要翻译: 以加密安全的方式移动副本,使得移动的目标位置和定时完全被任何用户隐藏,或者被有限数量的用户保持为秘密,这些用户被提前通知新位置和重定位时间 一个副本。 描述副本的当前位置的副本位置的目录以加密形式存储,以防止个人确定副本的确切位置。 由于副本的位置在任何给定的时刻被隐藏,所以攻击者可能不会使用副本的位置来同时攻击所有的副本。 因此,恢复机制可能有机会从任何给定的攻击中恢复,从而再次从未受到攻击的副本创建副本。

    Scoped metadata
    95.
    发明授权
    Scoped metadata 有权
    范围元数据

    公开(公告)号:US07418457B2

    公开(公告)日:2008-08-26

    申请号:US11097355

    申请日:2005-04-04

    IPC分类号: G06F7/04

    摘要: Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. Communication of metadata is expedited using hash digests to confirm metadata versions, and by piggybacking policy metadata requests and responses on other substantive data communication messages, thereby dynamically altering future communications.

    摘要翻译: 提供了传达对象元数据的方法,系统和数据结构。 提出了一个通用的元数据容器,允许使用协议中立和平台无关的方法以可扩展的方式描述对象元数据。 元数据范围是指所包含的元数据语句对应的目标的动态范围。 元数据属性提供了一种描述元数据本身的机制,并且可以使用元数据安全性来确保发送和接收真实的元数据。 还提供了机制来允许细化和替换元数据语句。 通过使用散列摘要来确认元数据版本,并通过捎带政策元数据请求和对其他实质性数据通信消息的响应来加速元数据的通信,从而动态地改变将来的通信。

    Visual programming environment providing synchronization between source code and graphical component objects
    96.
    发明授权
    Visual programming environment providing synchronization between source code and graphical component objects 有权
    视觉编程环境提供源代码和图形组件对象之间的同步

    公开(公告)号:US07370315B1

    公开(公告)日:2008-05-06

    申请号:US09717680

    申请日:2000-11-21

    IPC分类号: G06F9/44 G06F9/445 G06F3/048

    摘要: In an integrated development environment, there is a tight coupling between a design surface providing a visual representation of the various physical and logical entities in a software model and the underlying code structures that support the entities. The model can include varying combinations of a component model, a high level design whiteboard, or a physical model. Every object defined within the design surface is capable of being mapped directly to an underlying code structure. The model is a graphical representation of the actual code, thus providing two way updating, i.e., the model is updated when the programmer changes the code and vice versa.

    摘要翻译: 在集成开发环境中,在软件模型中提供各种物理和逻辑实体的视觉表示的设计表面与支持实体的底层代码结构之间存在紧密耦合。 该模型可以包括组件模型,高级设计白板或物理模型的不同组合。 在设计表面内定义的每个对象都能够被直接映射到底层的代码结构。 该模型是实际代码的图形表示,从而提供双向更新,即当程序员改变代码时更新模型,反之亦然。

    TYPED AUTHORIZATION DATA
    97.
    发明申请
    TYPED AUTHORIZATION DATA 审中-公开
    类型授权数据

    公开(公告)号:US20080082626A1

    公开(公告)日:2008-04-03

    申请号:US11536996

    申请日:2006-09-29

    IPC分类号: G06F15/16

    CPC分类号: H04L63/0823

    摘要: Requesting security tokens with typed information. A method includes accessing at a client, information to allow the client to request a token for accessing functionality of a service. The method further includes sending a client request from the client to a token issuer in a token request. The client request includes the information and at least one of information defining the source of the information, proof of the source of the information; or usage information specifying how the information should be used.

    摘要翻译: 使用类型信息请求安全令牌。 一种方法包括在客户端访问信息以允许客户端请求用于访问服务功能的令牌。 该方法还包括在令牌请求中将客户端请求从客户端发送到令牌发行者。 客户请求包括信息和定义信息来源的信息的至少一个信息的来源的证明; 或指定如何使用信息的使用信息。

    MULTIPLE PEER GROUPS FOR EFFICIENT SCALABLE COMPUTING
    98.
    发明申请
    MULTIPLE PEER GROUPS FOR EFFICIENT SCALABLE COMPUTING 审中-公开
    用于高效计算的多个对等体组

    公开(公告)号:US20080080530A1

    公开(公告)日:2008-04-03

    申请号:US11536984

    申请日:2006-09-29

    IPC分类号: H04L12/56

    摘要: Multiple peer groups for performing computing, communication, and/or storage tasks. A method may be performed for example, in a computing environment including one or more agents networked together. The method includes providing data to the agents using two or more distinct peer groups. The peer groups include members from among the agents. The method further includes performing at each of the peer groups operations on the data. Each peer group is configured to perform a specific operation. The method also includes coordinating the operations at each of the peer groups such that a common computing, communication and/or storage task is accomplished by aggregating the operations at each of the peer groups.

    摘要翻译: 用于执行计算,通信和/或存储任务的多个对等组。 例如,可以在包括联网在一起的一个或多个代理的计算环境中执行方法。 该方法包括使用两个或多个不同对等体组向代理提供数据。 同行群体包括代理商中的成员。 该方法还包括在每个对等体组上对数据执行操作。 每个对等体组被配置为执行特定的操作。 该方法还包括协调每个对等体组的操作,使得通过聚合每个对等体组的操作来实现公共计算,通信和/或存储任务。

    MULTIPLE PEER GROUPS FOR EFFICIENT SCALABLE COMPUTING

    公开(公告)号:US20080080528A1

    公开(公告)日:2008-04-03

    申请号:US11536944

    申请日:2006-09-29

    IPC分类号: H04L12/56

    摘要: Multiple peer groups for performing computing, communication, and/or storage tasks. A method may be performed for example, in a computing environment including one or more agents networked together. The method includes providing data to the agents using two or more distinct peer groups. The peer groups include members from among the agents. The method further includes performing at each of the peer groups operations on the data. Each peer group is configured to perform a specific operation. The method also includes coordinating the operations at each of the peer groups such that a common computing, communication and/or storage task is accomplished by aggregating the operations at each of the peer groups.

    Project-based configuration management method and apparatus
    100.
    发明授权
    Project-based configuration management method and apparatus 有权
    基于项目的配置管理方法和设备

    公开(公告)号:US07251655B2

    公开(公告)日:2007-07-31

    申请号:US10851885

    申请日:2004-05-21

    IPC分类号: G06F17/30

    摘要: A configuration management system creates (602) each configuration by assigning a configuration identifier to each configuration. In addition, relational information is computed (706) that indicates the relationships between the configuration and any configurations upon which it is based. The system then tracks (604) changes to files of the configuration by storing information associating each new file version with the configuration identifier. The system also tracks (1210) changes to file properties. A configuration is then reconstructed (608) as of a desired date, by identifying (2104, 2106) the file versions and properties associated with that configuration as of the desired date. A determination is made (2110) whether a user that has requested the file versions has access privileges by first checking a security cache (2600) for the user privileges information. If the information is not on the cache, it is computed from a security table (2800) and stored on the cache. The system automatically compresses (3118) and reconstitutes (3006) file versions that are stored in the version store.

    摘要翻译: 配置管理系统通过为每个配置分配配置标识符来创建(602)每个配置。 另外,计算关系信息(706),其指示配置和基于其的任何配置之间的关系。 然后,系统通过存储将每个新文件版本与配置标识符相关联的信息来跟踪(604)对配置文件的更改。 系统还跟踪(1210)文件属性的更改。 然后,通过根据期望日期识别(2104,2106)与该配置相关联的文件版本和属性,从而将所需日期重新构建(608)。 (2110)通过首先检查用户权限信息的安全缓存(2600),确定已请求文件版本的用户是否具有访问权限。 如果信息不在缓存上,则从安全表(2800)计算并存储在缓存中。 系统自动压缩存储在版本存储中的(3118)和重构(3006)文件版本。