Method for securely providing a text file for execution
    1.
    发明授权
    Method for securely providing a text file for execution 失效
    安全提供文本文件执行的方法

    公开(公告)号:US06629103B1

    公开(公告)日:2003-09-30

    申请号:US09704584

    申请日:2000-11-02

    Abstract: A method is described that is implemented by a server for securely providing a text file to a client for execution. The method includes providing an encrypted text file and a program facilitating execution of the encrypted text file to the client. Such providing may be over the Internet or using a computer readable medium such as compact disc. The provided program responds to a run command to decrypt the encrypted text file, and feed the decrypted text file to an interpreter for execution.

    Abstract translation: 描述了一种由服务器实现的方法,用于将客户机安全地提供文本文件供执行。 该方法包括提供加密的文本文件和促进对客户端加密的文本文件的执行的程序。 这种提供可以在因特网上或使用诸如光盘的计算机可读介质。 所提供的程序响应运行命令来解密加密的文本文件,并将解密的文本文件提供给解释器以供执行。

    Method and apparatus for rendering an IC design layout employing graphics files at low zoom-in factors
    2.
    发明授权
    Method and apparatus for rendering an IC design layout employing graphics files at low zoom-in factors 失效
    用于以低放大因素呈现采用图形文件的IC设计布局的方法和装置

    公开(公告)号:US06510543B1

    公开(公告)日:2003-01-21

    申请号:US09678514

    申请日:2000-10-03

    CPC classification number: G06F17/5068

    Abstract: A method and apparatus for rendering an integrated circuit design layout is described. Graphics files are generated for selected zoom-in factors from cell-based information of the integrated circuit design, and stored in memory. When a computer operator selects a zoom-in factor greater by a predetermined amount than the largest of such selected zoom-in factors, a selector enables a rendering engine to render the integrated circuit design layout from the cell-based information. On the other hand, when the computer operator selects a zoom-in factor less than the largest of such selected zoom-in factors plus the predetermined amount, the selector enables a graphics processor to render the integrated circuit design layout from appropriate ones of the graphics files.

    Abstract translation: 描述了用于呈现集成电路设计布局的方法和装置。 为集成电路设计的基于单元格的信息为选定的放大因子生成图形文件,并存储在存储器中。 当计算机操作员选择比所选择的放大因子中的最大值大的预定量的放大因子时,选择器使渲染引擎能够从基于单元的信息呈现集成电路设计布局。 另一方面,当计算机操作者选择小于所选择的放大因子中最大的放大因子加上预定量时,选择器使得图形处理器能够从适当的图形渲染集成电路设计布局 文件。

    Method and system for conducting a collaboration session over the internet
    3.
    发明申请
    Method and system for conducting a collaboration session over the internet 审中-公开
    通过互联网进行协作会议的方法和系统

    公开(公告)号:US20050055642A1

    公开(公告)日:2005-03-10

    申请号:US10965632

    申请日:2004-10-14

    CPC classification number: H04L12/1813 H04L67/02 H04L67/142 H04L69/329

    Abstract: A method of conducting an interactive design conference over the Internet, comprises: selectively admitting clients communicating through web browsers over the Internet to an interactive design conference; receiving a graphics file indicative of a design from one of the clients; and transmitting the graphics file to the other clients so as to be viewable as a graphics image through graphics file readers in the client web browsers. The graphics file is generated by a snapshot program previously transmitted to a client initiating the design conference and controlling the design database. Java applets are transmitted to each of the design conference participants to facilitate communicating annotations of the graphics image and messages between clients through their web browsers.

    Abstract translation: 一种通过因特网进行交互式设计会议的方法,包括:通过互联网选​​择性地将通过网络浏览器进行通信的客户端接入交互式设计会议; 从一个客户端接收指示设计的图形文件; 并将图形文件传输到其他客户端,以便通过客户端Web浏览器中的图形文件读取器可视为图形图像。 图形文件由先前发送到客户端的快照程序生成,启动设计会议并控制设计数据库。 将Java小程序传送到每个设计会议参与者,以便于通过其Web浏览器在客户端之间传递图形图像的注释和消息。

    Enterprise security management system using hierarchical organization and multiple ownership structure
    5.
    发明授权
    Enterprise security management system using hierarchical organization and multiple ownership structure 有权
    企业安全管理体系采用分层组织和多重所有权结构

    公开(公告)号:US08126920B2

    公开(公告)日:2012-02-28

    申请号:US10991829

    申请日:2004-11-18

    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.

    Abstract translation: 描述了网络计算机用户的分层安全模型。 文件和资源由网络内的用户控制或创建。 网络中的每个用户都有一个由网络管理员管理的帐户。 该帐户指定用户标识符和密码。 用户根据功能或其他组织参数分组到组织中。 网络中的组织按访问权限和控制权限分层组织。 较高级别组中的用户可以对较低级别组中的用户拥有的文件或资源执行访问和控制权限。 每个用户的帐户进一步指定所有者所属的组以及对用户组具有访问权限的任何更高级别组的标识符。 组内的所有用户都会继承该组的权限和限制。

    Enterprise security management system using hierarchical organization and multiple ownership structure
    6.
    发明授权
    Enterprise security management system using hierarchical organization and multiple ownership structure 有权
    企业安全管理体系采用分层组织和多重所有权结构

    公开(公告)号:US08762357B2

    公开(公告)日:2014-06-24

    申请号:US13406472

    申请日:2012-02-27

    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.

    Abstract translation: 描述了网络计算机用户的分层安全模型。 文件和资源由网络内的用户控制或创建。 网络中的每个用户都有一个由网络管理员管理的帐户。 该帐户指定用户标识符和密码。 用户根据功能或其他组织参数分组到组织中。 网络中的组织按访问权限和控制权限分层组织。 较高级别组中的用户可以对较低级别组中的用户拥有的文件或资源执行访问和控制权限。 每个用户的帐户进一步指定所有者所属的组以及对用户组具有访问权限的任何更高级别组的标识符。 组内的所有用户都会继承该组的权限和限制。

    Enterprise Security Management System Using Hierarchical Organization and Multiple Ownership Structure
    7.
    发明申请
    Enterprise Security Management System Using Hierarchical Organization and Multiple Ownership Structure 有权
    企业安全管理体系运用层次结构和多重所有制结构

    公开(公告)号:US20120158787A1

    公开(公告)日:2012-06-21

    申请号:US13406472

    申请日:2012-02-27

    Abstract: A hierarchical security model for networked computer users is described. Files and resources are controlled or created by users within the network. Each user within the network has an account that is managed by a network administrator. The account specifies the user identifier and password. Users are grouped into organizations depending upon function or other organizational parameter. The groups within the network are organized hierarchically in terms of access and control privileges. Users within a higher level group may exercise access and control privileges over files or resources owned by users in a lower level group. The account for each user further specifies the group that the owner belongs to and an identifier for any higher level groups that have access privileges over the user's group. All users within a group inherit the rights and restrictions of the group.

    Abstract translation: 描述了网络计算机用户的分层安全模型。 文件和资源由网络内的用户控制或创建。 网络中的每个用户都有一个由网络管理员管理的帐户。 该帐户指定用户标识符和密码。 用户根据功能或其他组织参数分组到组织中。 网络中的组织按访问权限和控制权限分层组织。 较高级别组中的用户可以对较低级别组中的用户拥有的文件或资源执行访问和控制权限。 每个用户的帐户进一步指定所有者所属的组以及对用户组具有访问权限的任何更高级别组的标识符。 组内的所有用户都会继承该组的权限和限制。

    Method and apparatus implemented in a firewall for communicating information between programs employing different protocols
    8.
    发明授权
    Method and apparatus implemented in a firewall for communicating information between programs employing different protocols 失效
    在防火墙中实现的用于在使用不同协议的程序之间传送信息的方法和装置

    公开(公告)号:US06874086B1

    公开(公告)日:2005-03-29

    申请号:US09636135

    申请日:2000-08-10

    CPC classification number: H04L63/0281

    Abstract: A computer system includes a web client having a client based program residing on it, a firewall having a protocol proxy residing on it, and a host server having an application program and a special window manager residing on it. All communications between the protocol proxy and the application program go through the special window manager. The web client communicates with the firewall through the Internet, and the firewall communicates with the host server through a LAN. The client based program employs HTTP, and the special window manager employs a persistent connection, socket-based protocol. The protocol proxy establishes and maintains a persistent connection with the special window manager, and communicates information back and forth between the client based program and the application program through the special window manager by first protocol translating the information between HTTP and the special window manager's persistent connection, socket-based protocol.

    Abstract translation: 计算机系统包括具有驻留在其上的基于客户机的程序的Web客户机,具有驻留在其上的协议代理的防火墙以及驻留在其上的具有应用程序和特殊窗口管理器的主机服务器。 协议代理和应用程序之间的所有通信都通过特殊的窗口管理器。 Web客户端通过Internet与防火墙进行通信,防火墙通过LAN与主机服务器进行通信。 基于客户端的程序采用HTTP,特殊窗口管理器采用持久连接,基于套接字的协议。 协议代理建立和维护与特殊窗口管理器的持续连接,并通过特殊窗口管理器在基于客户端的程序和应用程序之间来回传递信息,第一协议将HTTP和特殊窗口管理器的持久连接之间的信息进行转换 ,基于套接字的协议。

Patent Agency Ranking