System and method utilizing a graphical user interface of a business process workflow scheduling program
    1.
    发明授权
    System and method utilizing a graphical user interface of a business process workflow scheduling program 有权
    利用业务流程工作流调度程序的图形用户界面的系统和方法

    公开(公告)号:US07184967B1

    公开(公告)日:2007-02-27

    申请号:US09800163

    申请日:2001-03-06

    IPC分类号: G05B19/418

    摘要: A graphical user interface (GUI) scheduler program is provided for modeling business workflow processes. The GUI scheduler program includes tools to allow a user to create a schedule for business workflow processes based on a set of rules defined by the GUI scheduler program. The rules facilitate deadlock not occurring within the schedule. The program provides tools for creating and defining message flows between entities. Additionally, the program provides tools that allow a user to define a binding between the schedule and components, such as COM components, script components, message queues and other workflow schedules. The scheduler program allows a user to define actions and group actions into transactions using simple GUI scheduling tools. The schedule can then be converted to executable code in a variety of forms such as XML, C, C+ and C++. The executable code can then be converted or interpreted for running the schedule.

    摘要翻译: 提供了图形用户界面(GUI)调度程序,用于对业务工作流程进行建模。 GUI调度程序包括允许用户基于由GUI调度程序定义的一组规则为业务工作流处理创建调度的工具。 这些规则有助于在时间表内不发生死锁。 该程序提供用于创建和定义实体之间的消息流的工具。 此外,该程序还提供允许用户定义调度和组件(如COM组件,脚本组件,消息队列和其他工作流程表)之间的绑定的工具。 调度程序允许用户使用简单的GUI调度工具来定义操作并将操作分组到事务中。 然后可以将调度表转换为各种形式的可执行代码,如XML,C,C ++和C ++。 然后可以转换或解释可执行代码来运行计划。

    Automatic object caller chain with declarative impersonation and transitive trust
    2.
    发明授权
    Automatic object caller chain with declarative impersonation and transitive trust 有权
    具有声明性模拟和传递信任的自动对象调用者链

    公开(公告)号:US06385724B1

    公开(公告)日:2002-05-07

    申请号:US09201276

    申请日:1998-11-30

    IPC分类号: G06F0124

    摘要: An object-based security framework provides automatic caller chain building to track the identity of upstream callers. An application developer can define impersonation settings declaratively using a graphical interface. At runtime, logic outside the application objects handles the caller chain and impersonation, relieving the developer from having to incorporate impersonation logic into the application. A group of special identities are permitted to provide identities of others without themselves being recorded in the chain when the chain traverses a method invocation queue. The framework supports a copy style for the chain to support various caller scenarios. Additionally, a minimum authentication level can be enforced throughout the chain. The caller chain can be used in conjunction with roles, and objects may consult the chain programmatically to enforce a custom security scheme.

    摘要翻译: 基于对象的安全框架提供自动呼叫者链建立,以跟踪上游呼叫者的身份。 应用程序开发人员可以使用图形界面以声明方式定义模拟设置。 在运行时,应用程序对象之外的逻辑处理调用者链和模拟,从而减轻开发人员将模拟逻辑并入到应用程序中。 允许一组特殊身份提供其他人的身份,而不会在链中遍历方法调用队列时将其标识在链中。 该框架支持链的副本样式,以支持各种调用方案。 此外,可以在整个链中实施最低认证级别。 调用者链可以与角色一起使用,对象可以以编程方式查询链,以实施自定义安全性方案。

    Automatic object caller chain with declarative impersonation and transitive trust

    公开(公告)号:US06604198B1

    公开(公告)日:2003-08-05

    申请号:US10137911

    申请日:2002-05-03

    IPC分类号: G06F0124

    摘要: An object-based security framework provides automatic caller chain building to track the identity of upstream callers. An application developer can define impersonation settings declaratively using a graphical interface. At runtime, logic outside the application objects handles the caller chain and impersonation, relieving the developer from having to incorporate impersonation logic into the application. A group of special identities are permitted to provide identities of others without themselves being recorded in the chain when the chain traverses a method invocation queue. The framework supports a copy style for the chain to support various caller scenarios. Additionally, a minimum authentication level can be enforced throughout the chain. The caller chain can be used in conjunction with roles, and objects may consult the chain programmatically to enforce a custom security scheme.

    MESH-MANAGING DATA ACROSS A DISTRIBUTED SET OF DEVICES
    4.
    发明申请
    MESH-MANAGING DATA ACROSS A DISTRIBUTED SET OF DEVICES 有权
    通过分布式设备来管理数据

    公开(公告)号:US20110040850A1

    公开(公告)日:2011-02-17

    申请号:US12910757

    申请日:2010-10-22

    IPC分类号: G06F15/167

    摘要: Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over the mesh. Information in the core object may be identified with a corresponding user such that a user may use any collaborating device in the mesh to access the information. In one example, the information is stored remotely from a device used to access the information. A remote source may store the desired information or may determine the storage location of the desired information in the mesh and may further provide the desired information to a corresponding user.

    摘要翻译: 数据文件,应用程序和/或对应的用户界面可以在与网格协作的设备上访问。 网格可以包括在网络中协作的任何数量或类型的设备。 数据,应用和/或对应的用户界面可以存储在可以在网格上共享的核心对象中。 核心对象中的信息可以与对应的用户识别,使得用户可以使用网格中的任何协作设备来访问该信息。 在一个示例中,信息从用于访问信息的设备远程存储。 远程源可以存储期望的信息,或者可以确定网格中期望信息的存储位置,并且还可以向相应的用户提供期望的信息。

    Mesh-managing data across a distributed set of devices
    5.
    发明授权
    Mesh-managing data across a distributed set of devices 有权
    在分布式设备集中对网络进行数据管理

    公开(公告)号:US07853669B2

    公开(公告)日:2010-12-14

    申请号:US11744777

    申请日:2007-05-04

    IPC分类号: G06F15/16 G06F9/44

    摘要: Data files, applications and/or corresponding user interfaces may be accessed at a device that collaborates in a mesh. The mesh may include any number or type of devices that collaborate in a network. Data, applications and/or corresponding user interfaces may be stored within a core object that may be shared over the mesh. Information in the core object may be identified with a corresponding user such that a user may use any collaborating device in the mesh to access the information. In one example, the information is stored remotely from a device used to access the information. A remote source may store the desired information or may determine the storage location of the desired information in the mesh and may further provide the desired information to a corresponding user.

    摘要翻译: 数据文件,应用程序和/或对应的用户界面可以在与网格协作的设备上访问。 网格可以包括在网络中协作的任何数量或类型的设备。 数据,应用和/或对应的用户界面可以存储在可以在网格上共享的核心对象中。 核心对象中的信息可以与对应的用户识别,使得用户可以使用网格中的任何协作设备来访问该信息。 在一个示例中,信息从用于访问信息的设备远程存储。 远程源可以存储期望的信息,或者可以确定网格中期望信息的存储位置,并且还可以向相应的用户提供期望的信息。

    Object security boundaries
    6.
    发明授权
    Object security boundaries 有权
    对象安全边界

    公开(公告)号:US06487665B1

    公开(公告)日:2002-11-26

    申请号:US09201060

    申请日:1998-11-30

    IPC分类号: G06F1130

    摘要: An object-based security framework provides for intra-process security boundaries. An application developer can define security settings declaratively at the object, interface, and method level using a graphical interface. When the application is deployed, the settings are placed into a central store and can be modified at a later time. At runtime, logic outside the application objects enforces the security boundaries, relieving the developer of having to incorporate security logic into the application. Changes to the security can be implemented by changing the settings without having to change the application objects. In addition to checking for identity, the security framework supports roles and enforces specified authentication levels. The integrity of an application's security scheme is retained when the application is combined with another application in the framework.

    摘要翻译: 基于对象的安全框架提供了进程内安全边界。 应用程序开发人员可以使用图形界面以对象,接口和方法级别声明性地定义安全性设置。 当部署应用程序时,设置将放置在中央存储区中,并可在以后进行修改。 在运行时,应用程序对象之外的逻辑强制执行安全边界,减轻开发人员必须将安全逻辑并入到应用程序中。 可以通过更改设置来实现对安全性的更改,而无需更改应用程序对象。 除了检查身份之外,安全框架还支持角色并强制执行指定的身份验证级别。 当应用程序与框架中的另一个应用程序组合时,应用程序的安全性方案的完整性将被保留。

    Method for synchronizing reserved areas in a redundant storage array
    8.
    发明授权
    Method for synchronizing reserved areas in a redundant storage array 失效
    用于同步冗余存储阵列中的保留区域的方法

    公开(公告)号:US06301675B1

    公开(公告)日:2001-10-09

    申请号:US09093242

    申请日:1998-06-08

    IPC分类号: H02H305

    摘要: A redundant array storage system in which a reserved area of a multiplicity of data storage units can be reliably synchronized, even if the synchronization cycle is interrupted by an unforeseen event or situation, such as sudden loss of power to the system or a component failure. By maintaining two groups or partitions of data storage units and updating only one group at a time, and by having a global table which provides information regarding which group of storage units is being updated, the present invention allows the system to reliably determine which of the data storage units maintain valid data in their reserved area and to conform the reserved areas of the other group of data storage units to the valid values, without the use of additional hardware devices.

    摘要翻译: 即使同步周期被不可预见的事件或情况(例如对系统的电力突然损失或组件故障)中断,冗余阵列存储系统也可以可靠地同步多个数据存储单元的保留区域。 通过维护数据存储单元的两个组或分区,并且一次更新一个组,并且通过具有提供关于哪一组存储单元被更新的信息的全局表,本发明允许系统可靠地确定哪个 数据存储单元保留其保留区域中的有效数据,并将另一组数据存储单元的保留区域保持为有效值,而不使用附加的硬件设备。

    Method for synchronizing reserved areas in a redundant storage array

    公开(公告)号:US5590276A

    公开(公告)日:1996-12-31

    申请号:US404941

    申请日:1995-03-15

    摘要: A redundant array storage system in which a reserved area of a multiplicity of data storage units can be reliably synchronized, even if the synchronization cycle is interrupted by an unforeseen event or situation, such as sudden loss of power to the system or a component failure. By maintaining two groups or partitions of data storage units and updating only one group at a time, and by having a global table which provides information regarding which group of storage units is being updated, the present invention allows the system to reliably determine which of the data storage units maintain valid data in their reserved area and to conform the reserved areas of the other group of data storage units to the valid values, without the use of additional hardware devices.