Synchronization of Shared Folders and Files
    1.
    发明申请

    公开(公告)号:US20180314713A1

    公开(公告)日:2018-11-01

    申请号:US15669824

    申请日:2017-08-04

    Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.

    Synchronization of shared folders and files

    公开(公告)号:US09747297B2

    公开(公告)日:2017-08-29

    申请号:US14494143

    申请日:2014-09-23

    CPC classification number: G06F17/30174

    Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.

    Hierarchical policy-based shared resource access control

    公开(公告)号:US09800584B1

    公开(公告)日:2017-10-24

    申请号:US15341895

    申请日:2016-11-02

    Abstract: Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, “lazy evaluation” approach to access control is described in which an effective access control list for a computing resource is determined after a request is received from a user to access the resource. When resources are shared, access control policies are created and stored in association with the shared resource but are not stored in association with hierarchically related lower-level resources. When an access request for a resource is received, access control policies are collected for levels of a computing resource hierarchy that are higher than the hierarchy level of the resource. An effective access control list is determined based on permissions specified in the collected access control policies. The effective access control list represents an effective propagation of access control policies of higher hierarchy levels to the computing resource.

    Synchronization of Shared Folders and Files
    4.
    发明申请
    Synchronization of Shared Folders and Files 有权
    共享文件夹和文件的同步

    公开(公告)号:US20160085769A1

    公开(公告)日:2016-03-24

    申请号:US14494143

    申请日:2014-09-23

    CPC classification number: G06F17/30174

    Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.

    Abstract translation: 在远程和本地文件系统中同步共享文件夹和文件的方法包括确定远程和本地文件系统状态。 远程文件系统状态包括用于共享文件夹,共享子文件夹,共享文件,共享子级文件和共享快捷方式的远程实例的远程哈希值。 本地文件系统状态包括共享文件夹,共享子文件夹,共享文件,共享子级文件和共享快捷方式的本地实例的本地哈希值。 该方法还包括比较远程文件系统状态和本地文件系统状态,以确定远程文件系统状态和本地文件系统状态之间的散列值的任何差异,并同步任何共享文件夹,共享子文件夹或共享文件 在远程文件系统状态和本地文件系统和远程文件系统中的本地文件系统状态具有不同的值。

    Synchronization of shared folders and files

    公开(公告)号:US10482067B2

    公开(公告)日:2019-11-19

    申请号:US15669824

    申请日:2017-08-04

    Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.

    Hierarchical policy-based shared resource access control

    公开(公告)号:US10154039B1

    公开(公告)日:2018-12-11

    申请号:US15706349

    申请日:2017-09-15

    Abstract: Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, “lazy evaluation” approach to access control is described in which an effective access control list for a computing resource is determined after a request is received from a user to access the resource. When resources are shared, access control policies are created and stored in association with the shared resource but are not stored in association with hierarchically related lower-level resources. When an access request for a resource is received, access control policies are collected for levels of a computing resource hierarchy that are higher than the hierarchy level of the resource. An effective access control list is determined based on permissions specified in the collected access control policies. The effective access control list represents an effective propagation of access control policies of higher hierarchy levels to the computing resource.

    Hierarchical policy-based shared resource access control
    7.
    发明授权
    Hierarchical policy-based shared resource access control 有权
    基于层次式策略的共享资源访问控制

    公开(公告)号:US09516028B1

    公开(公告)日:2016-12-06

    申请号:US14453368

    申请日:2014-08-06

    Abstract: Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, “lazy evaluation” approach to access control is described in which an effective access control list for a computing resource is determined after a request is received from a user to access the resource. When resources are shared, access control policies are created and stored in association with the shared resource but are not stored in association with hierarchically related lower-level resources. When an access request for a resource is received, access control policies are collected for levels of a computing resource hierarchy that are higher than the hierarchy level of the resource. An effective access control list is determined based on permissions specified in the collected access control policies. The effective access control list represents an effective propagation of access control policies of higher hierarchy levels to the computing resource.

    Abstract translation: 本文提供了分层系统中共享计算资源的访问控制。 描述了访问控制的“懒惰评估”方法,其中在从用户接收到访问资源的请求之后,确定用于计算资源的有效访问控制列表。 当共享资源时,与共享资源相关联地创建和存储访问控制策略,但不与层级相关的较低级资源相关联地存储。 当接收到对资源的​​访问请求时,针对高于资源层级的计算资源层次结构的级别收集访问控制策略。 基于收集的访问控制策略中指定的权限确定有效的访问控制列表。 有效的访问控制列表表示将较高级别级别的访问控制策略有效传播到计算资源。

Patent Agency Ranking