Secure internet-scale eventing
    41.
    发明授权
    Secure internet-scale eventing 有权
    安全的互联网规模事件

    公开(公告)号:US08086849B2

    公开(公告)日:2011-12-27

    申请号:US10210067

    申请日:2002-08-02

    IPC分类号: H04L9/00

    摘要: A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event generation device for generating and disseminating an event message through the network to event distribution devices serving as edge event delivery devices having recipient devices connected thereto. Event messages may be encrypted at the event generation device for each of the destination recipient devices or event messages may be encrypted at each of the edge event delivery devices for delivery to respective recipient devices connected thereto. A signing key may also be included with the encrypted message such that the respective recipient devices may authenticate a sender of the encrypted message based on the signing key. Encryption keys may be established based on policies of the network of event distribution devices or based on policies of the respective recipient devices.

    摘要翻译: 提供了一种以安全可伸缩的方式传送事件消息的方法和系统。 网络包括作为事件发生设备的事件发布设备,用于通过网络生成和传播事件消息到用作具有连接到其的接收设备的边缘事件传递设备的事件分发设备。 事件消息可以在每个目的地接收者设备的事件生成设备处被加密,或者可以在每个边缘事件传递设备处对事件消息进行加密,以便递送到与之相连接的相应接收者设备。 签名密钥也可以包含在加密的消息中,使得相应的接收者设备可以基于签名密钥来认证加密消息的发送者。 加密密钥可以基于事件分发设备的网络的策略或基于各个接收方设备的策略来建立。

    Securely calling web services from macros
    42.
    发明授权
    Securely calling web services from macros 有权
    从宏安全地调用Web服务

    公开(公告)号:US07882547B2

    公开(公告)日:2011-02-01

    申请号:US11299463

    申请日:2005-12-12

    IPC分类号: H04L29/06

    CPC分类号: H04L63/123 G06F21/445

    摘要: A method of securing communications between an application that includes a macro and a Web Service. The method includes an act of, at the macro, generating a request for data. The request for data comprises generating commands for retrieving data, generating security information, and embedding the commands for retrieving data and the security information in a request. The request for data is sent to the Web Service. The requested data is received from the Web Service if the security information provides appropriate authorization to receive the requested data.

    摘要翻译: 一种确保包含宏和Web服务的应用程序之间通信的方法。 该方法包括在宏处产生数据请求的动作。 数据请求包括生成用于检索数据的命令,生成安全信息,以及在请求中嵌入用于检索数据和安全信息的命令。 数据请求被发送到Web服务。 如果安全信息提供适当的授权以接收所请求的数据,则从Web服务接收所请求的数据。

    Generic application server and method of operation therefor
    43.
    发明授权
    Generic application server and method of operation therefor 有权
    通用应用服务器及其操作方法

    公开(公告)号:US08359595B2

    公开(公告)日:2013-01-22

    申请号:US11342453

    申请日:2006-01-30

    IPC分类号: G06F9/46 G06F15/16

    CPC分类号: G06F9/4843

    摘要: A generic application server is capable of simultaneously receiving requests, processing requested work, and returning results using multiple, conceptual thread pools. In addition, functions are programmable as state machines. While executing such a function, when a worker thread encounters a potentially blocking condition, the thread issues an asynchronous request for data, a state transition is performed, and the thread is released to do other work. After the blocking condition is relieved, another worker thread is scheduled to advance to the next function state and continue the function. Multiple priority work queues are used to facilitate completion of functions already in progress. In addition, lower-priority complex logic threads can be invoked to process computationally intense logic that may be necessitated by a request. Throttling functions are also implemented, which control the quantity of work accepted into the server and server response time.

    摘要翻译: 通用应用程序服务器能够同时接收请求,处理所请求的工作,并使用多个概念线程池返回结果。 此外,功能可编程为状态机。 在执行这样的功能时,当一个工作线程遇到一个潜在的阻塞状态时,该线程发出一个数据异步请求,执行一个状态转换,并释放该线程以执行其他工作。 缓解阻塞状态后,另一个工作线程被调度到下一个功能状态并继续运行。 多个优先级工作队列用于促进已经在进行的功能的完成。 此外,可以调用较低优先级的复杂逻辑线程来处理请求可能需要的计算强度逻辑。 还实现了调节功能,控制服务器接受的工作量和服务器响应时间。

    Multiple peer groups for efficient scalable computing
    44.
    发明授权
    Multiple peer groups for efficient scalable computing 有权
    用于高效可扩展计算的多个对等组

    公开(公告)号:US07881316B2

    公开(公告)日:2011-02-01

    申请号:US11536944

    申请日:2006-09-29

    IPC分类号: H04L12/28 H04L12/56

    摘要: Multiple peer groups for performing computing, communication, and/or storage tasks. A method may be performed for example, in a computing environment including one or more agents networked together. The method includes providing data to the agents using two or more distinct peer groups. The peer groups include members from among the agents. The method further includes performing at each of the peer groups operations on the data. Each peer group is configured to perform a specific operation. The method also includes coordinating the operations at each of the peer groups such that a common computing, communication and/or storage task is accomplished by aggregating the operations at each of the peer groups.

    摘要翻译: 用于执行计算,通信和/或存储任务的多个对等组。 例如,可以在包括联网在一起的一个或多个代理的计算环境中执行方法。 该方法包括使用两个或多个不同的对等体组向代理提供数据。 同行群体包括代理商中的成员。 该方法还包括在每个对等体组上对数据执行操作。 每个对等体组被配置为执行特定的操作。 该方法还包括协调每个对等体组中的操作,使得通过聚合每个对等体组的操作来实现公共计算,通信和/或存储任务。

    Selecting policy for compatible communication
    45.
    发明授权
    Selecting policy for compatible communication 失效
    选择兼容通信的策略

    公开(公告)号:US07836489B2

    公开(公告)日:2010-11-16

    申请号:US11424415

    申请日:2006-06-15

    CPC分类号: G06F21/6218

    摘要: The present invention extends to methods, systems, and computer program products for selecting policy for compatible communication. Hierarchical policy document data structures represent communication (e.g., security) aspects and options such that lower aspects and options are accessed in the context of corresponding higher aspects and options to define applicable scope. Use of a hierarchical description also facilitates separation of what is being protected from how it is being protected thereby allowing security policy to be considered at different locations of a description document.

    摘要翻译: 本发明扩展到用于选择兼容通信的策略的方法,系统和计算机程序产品。 分级政策文件数据结构表示通信(例如,安全性)方面和选项,使得在对应的较高方面和选项的上下文中访问较低方面和选项以定义适用范围。 使用分层描述还有助于将被保护的内容与被保护的内容进行分离,从而允许在描述文档的不同位置处考虑安全策略。

    Extensible architecture for versioning APIs
    46.
    发明授权
    Extensible architecture for versioning APIs 失效
    用于版本API的可扩展架构

    公开(公告)号:US07610316B2

    公开(公告)日:2009-10-27

    申请号:US10935350

    申请日:2004-09-07

    IPC分类号: G06F12/00 G06F17/00 G06F9/44

    摘要: Some large software development projects need more than one versioning system to accommodate not only a diversity of document formats and data types, but also the geographic diversity of its programmers. However, having more than one versioning system is generally very expensive. A major factor in this expense is the requirement for a separate application program interface (API) for each separate versioning system. Accordingly, the inventors devised an exemplary API architecture that can be extended with “plug-in”protocol providers to include virtually any number of separate version stores or versioning systems. The exemplary architecture includes a generic command parser and a command dispatcher. The command dispatcher operatively couples to one or more protocol providers, each coupled to at least one version store. Inclusion of the OLE DB-compliant interface and the command parser in the exemplary embodiment saves the protocol providers the effort and expense of replicating these features, thereby reducing the cost of adding version stores.

    摘要翻译: 一些大型软件开发项目需要一个以上的版本控制系统,以适应文档格式和数据类型的多样性,同时也适应其程序员的地理多样性。 但是,拥有多个版本控制系统通常非常昂贵。 这个费用的一个主要因素是每个单独的版本控制系统需要一个单独的应用程序接口(API)。 因此,发明人设计了可以用“插件”协议提供者来扩展的示例性API架构,以实际包括任何数量的单独的版本存储或版本控制系统。 示例性架构包括通用命令解析器和命令分派器。 命令调度器可操作地耦合到一个或多个协议提供者,每个协议提供者耦合到至少一个版本存储。 在示例性实施例中包括OLE DB兼容接口和命令解析器保存协议提供者复制这些特征的努力和费用,从而降低添加版本存储的成本。

    Peer tunnels and peer group targets
    47.
    发明授权
    Peer tunnels and peer group targets 失效
    对等隧道和同伴组目标

    公开(公告)号:US07562151B2

    公开(公告)日:2009-07-14

    申请号:US11290960

    申请日:2005-11-30

    CPC分类号: H04L67/104 H04L67/1091

    摘要: Transferring data using peer-to-peer protocols. A method may be practiced, for example, at a computer system in a computer network. The computer network may include one or more networked agents formed into a peer group of peers using at least one peer-to-peer connection. The method includes an act of receiving a computer readable message from a peer-to-peer network. The computer readable message is a centric message enveloped in a peer-to-peer message. The centric message is extracted. The centric message is delivered to an agent configured for centric type communications.

    摘要翻译: 使用对等协议传输数据。 可以例如在计算机网络中的计算机系统上实施一种方法。 计算机网络可以包括使用至少一个对等连接形成到对等体组中的一个或多个联网代理。 该方法包括从对等网络接收计算机可读消息的动作。 计算机可读消息是包围在对等消息中的中心消息。 提取中心消息。 该中心消息传递给配置为中心型通信的代理。

    Searching with adaptively configurable user interface and extensible query language
    48.
    发明授权
    Searching with adaptively configurable user interface and extensible query language 有权
    使用自适应配置的用户界面和可扩展查询语言进行搜索

    公开(公告)号:US07370040B1

    公开(公告)日:2008-05-06

    申请号:US09717588

    申请日:2000-11-21

    IPC分类号: G06F7/00

    摘要: Most search engines include user interfaces and query languages which are tailored for use with specific file types. Thus, a user interface for searching one type file can be quite different than an interface for searching another file type. Disparate user interfaces are troublesome since users must continually reorient themselves as they switch from interface to interface to initiate searches for different file types. Additionally, many of these user interfaces use different query languages and structures, which are not generally adaptive to new file types and query language features. Accordingly, the present inventors developed an adaptively configurable user interface to facilitate a common user experience across two or more databases and an extensible common query structure to allow expansion of a query language to meet the demands of new file types. An exemplary embodiment includes a discovery mechanism for determining query properties of search providers, thereby facilitating adaptive configuring of a user interface to expose the determined query properties. An exemplary embodiment of the user interface includes a portion which remains relatively constant across two or more search providers to reduce user disorientation.

    摘要翻译: 大多数搜索引擎包括用于特定文件类型的用户界面和查询语言。 因此,用于搜索一个类型文件的用户界面可以与用于搜索另一种文件类型的界面完全不同。 不同的用户界面很麻烦,因为用户必须在从界面切换到界面时不断重新定位自己,才能开始搜索不同的文件类型。 此外,许多这些用户界面使用不同的查询语言和结构,通常不适用于新的文件类型和查询语言特征。 因此,本发明人开发了一种可自适应地配置的用户界面,以促进跨两个或多个数据库的通用用户体验,以及可扩展的公共查询结构,以允许扩展查询语言以满足新文件类型的需求。 示例性实施例包括用于确定搜索提供者的查询属性的发现机制,从而促进用户界面的自适应配置以公开确定的查询属性。 用户界面的示例性实施例包括在两个或多个搜索提供者之间保持相对恒定的部分,以减少用户迷失方向。

    CLIENT-BASED PSEUDONYMS
    49.
    发明申请
    CLIENT-BASED PSEUDONYMS 审中-公开
    基于客户的PSEUDONYMS

    公开(公告)号:US20080086766A1

    公开(公告)日:2008-04-10

    申请号:US11539255

    申请日:2006-10-06

    摘要: Obtaining tokens with alternate personally identifying information. A method may be practiced, for example, in a networked computing environment including a client and a token issuer. The token issuer provides security tokens to the client that the client can use for accessing functionality of services in the networked computing environment. The method includes sending a security token request to a token issuer. The security token request specifies alternate personally identifying information for an entity. The method further includes receiving a security token from the security token issuer. The security token includes the alternate personally identifying information.

    摘要翻译: 获取替代个人识别信息的令牌。 可以例如在包括客户端和令牌发行者的联网计算环境中实践一种方法。 令牌发行者向客户端提供安全令牌,客户端可以使用该令牌来访问联网计算环境中的服务功能。 该方法包括向令牌发行者发送安全令牌请求。 安全令牌请求指定了一个实体的备用个人识别信息。 该方法还包括从安全令牌发行者接收安全令牌。 安全令牌包括替代的个人识别信息。

    Project-based configuration management method and apparatus

    公开(公告)号:US06928447B2

    公开(公告)日:2005-08-09

    申请号:US10850780

    申请日:2004-05-21

    IPC分类号: G06F7/00 G06F9/44 G06F17/30

    摘要: A configuration management system creates (602) each configuration by assigning a configuration identifier to each configuration. In addition, relational information is computed (706) that indicates the relationships between the configuration and any configurations upon which it is based. The system then tracks (604) changes to files of the configuration by storing information associating each new file version with the configuration identifier. The system also tracks (1210) changes to file properties. A configuration is then reconstructed (608) as of a desired date, by identifying (2104, 2106) the file versions and properties associated with that configuration as of the desired date. A determination is made (2110) whether a user that has requested the file versions has access privileges by first checking a security cache (2600) for the user privileges information. If the information is not on the cache, it is computed from a security table (2800) and stored on the cache. The system automatically compresses (3118) and reconstitutes (3006) file versions that are stored in the version store.