System and method for distinguishing safe and potentially unsafe data during runtime processing
    2.
    发明申请
    System and method for distinguishing safe and potentially unsafe data during runtime processing 有权
    在运行时处理期间区分安全和潜在不安全数据的系统和方法

    公开(公告)号:US20060277604A1

    公开(公告)日:2006-12-07

    申请号:US11133676

    申请日:2005-05-20

    IPC分类号: G06F12/14

    CPC分类号: G06F21/52

    摘要: The techniques and mechanisms described herein are directed to a taint mechanism. An object-based command declares a taint directive for a parameter within a command declaration. The taint directive is then associated with that parameter in a manner such that when an engine processes the command, the engine determines whether to process the command based on the taint directive and input for the parameter. The taint directive may specify that the input may be tainted or untainted. The command declaration may also include a taint parameter that specifies a taint characteristic for output from the command. The taint characteristic may be tainted, untainted, or propagated. Any type of object may become tainted. An untaint process may be applied to tainted data to obtain untainted data if an authorization check performed by the engine is successful.

    摘要翻译: 本文描述的技术和机制针对污染机制。 基于对象的命令在命令声明中声明一个参数的污点指令。 然后,污染指令以这样的方式与该参数相关联,使得当引擎处理命令时,引擎根据污点指令和参数的输入来确定是否处理命令。 污点指令可能指定输入可能被污染或未被保留。 命令声明还可以包括一个污染参数,该参数指定了从命令输出的污点特性。 污点特性可能会被污染,未被维护或传播。 任何类型的物体可能会被污染。 如果发动机执行的授权检查成功,则可以将污染过程应用于污染数据以获得未维护的数据。

    Security mechanism for interpreting scripts in an interpretive environment

    公开(公告)号:US20060225036A1

    公开(公告)日:2006-10-05

    申请号:US11096623

    申请日:2005-03-31

    IPC分类号: G06F9/44

    CPC分类号: G06F9/45508

    摘要: The techniques and mechanisms described herein are directed to a scripting security mechanism that minimizes security risks associated with interpreting a script written with a scripting language. An interpreter recognizes the scripting-language syntax within the script and processes each line that is designated within a data block using a restrictive set of operations. The restrictive set of operations are a subset of the total operations available for processing. If one of the lines within the data block attempts to perform an operation that is not within the restrictive set of operations, the interpreter provides an indication, such as an exception or message explaining the illegal operation. The interpreter also recognizes a list of export variables associated with the data block and exports only the variables identified in the list to an external environment if the export variable meets a constraint identified for it, if any.

    Interpreter security mechanism
    4.
    发明申请
    Interpreter security mechanism 审中-公开
    口译安全机制

    公开(公告)号:US20070028211A1

    公开(公告)日:2007-02-01

    申请号:US11192535

    申请日:2005-07-29

    IPC分类号: G06F9/44

    CPC分类号: G06F21/52

    摘要: The techniques and mechanisms described herein are directed to an interpreter security mechanism that minimizes security risks associated with interpreting a script written with a scripting language. The interpreter security mechanism recognizes a marker that indicates a beginning for a set of non-interpreted lines. Upon recognizing the marker, the interpreter refrains from interpreting subsequent lines in the script until an end of marker occurs or an end of file occurs. The end of marker indicates that the interpreter can resume interpreting the lines in the script that follow the end of marker.

    摘要翻译: 本文描述的技术和机制针对解释器安全机制,其最小化与用脚本语言编写的脚本解释相关联的安全风险。 解释器安全机制识别指示一组非解释行的开始的标记。 识别标记后,解释器不会解释脚本中的后续行,直到出现标记结束或文件结束。 标记的末端表示解释器可以恢复解释跟随标记结尾的脚本中的行。

    Extensible security architecture for an interpretive environment
    5.
    发明申请
    Extensible security architecture for an interpretive environment 有权
    用于解释环境的可扩展安全架构

    公开(公告)号:US20060248574A1

    公开(公告)日:2006-11-02

    申请号:US11118971

    申请日:2005-04-28

    IPC分类号: H04L9/00

    CPC分类号: G06F21/54

    摘要: The techniques and mechanisms described herein are directed to an extensible security architecture that provides a security mechanism for minimizing security problems within interpretive environments. The extensible security architecture comprises a script engine configured to process a script and a security manager configured to monitor the processing of the script based on a security policy. The security manager determines whether to open an assembly associated with a command within the script, whether to process the command, whether to allow certain input to the command, and the like. The security policy may be implemented by overriding one or more methods of a base security class that are called when processing the script. The input may be an object passed via an object-based pipeline.

    摘要翻译: 本文所描述的技术和机制涉及可扩展的安全架构,其提供用于最小化解释环境内的安全问题的安全机制。 可扩展安全架构包括被配置为处理脚本的脚本引擎和被配置为基于安全策略来监视脚本的处理的安全管理器。 安全管理器确定是否打开与脚本中的命令相关联的程序集,是否处理命令,是否允许对命令的某些输入等。 可以通过覆盖在处理脚本时调用的基本安全类的一个或多个方法来实现安全策略。 输入可以是通过基于对象的管道传递的对象。

    Mechanism for converting text output into objects

    公开(公告)号:US20060064672A1

    公开(公告)日:2006-03-23

    申请号:US10944459

    申请日:2004-09-17

    IPC分类号: G06F9/44

    CPC分类号: G06F17/248

    摘要: The techniques and mechanisms described herein are directed at converting text into objects based on a template that describes the format of the text. The objects then being available for further processing. The conversion mechanism converts the text into an object having at least one method that is directly invocable and that is specific to a data type specified for the live object. The template comprises an object header indicator and a corresponding object header pattern. A new object is created whenever the object header pattern is identified within the text. In addition, the template comprises one or more field indicators each having a corresponding field pattern. The field pattern is in a format of a regular expression. A new field is created for the new object whenever a field pattern is identified within the text.

    Mechanism for converting text output into objects
    7.
    发明申请
    Mechanism for converting text output into objects 失效
    将文本输出转换为对象的机制

    公开(公告)号:US20060064668A1

    公开(公告)日:2006-03-23

    申请号:US10998477

    申请日:2004-11-29

    IPC分类号: G06F9/44

    CPC分类号: G06F17/248

    摘要: The techniques and mechanisms described herein are directed at converting text into objects based on a template that describes the format of the text, where the format of the text is not in a standardized format. The objects then being available for further processing. The conversion mechanism converts the text into a dead object. The template comprises an object header indicator and a corresponding object header pattern. A new object is created based on the object header pattern identified within the text. In addition, the template comprises one or more field indicators each having a corresponding field pattern. The field pattern may be in a format of a regular expression. A field type and associated value are created from a string associated with the field pattern.

    摘要翻译: 本文描述的技术和机制旨在基于描述文本的格式的模板将文本转换为对象,其中文本的格式不是标准化格式。 然后可以进行进一步处理。 转换机制将文本转换为死对象。 模板包括对象标题指示符和相应的对象标题模式。 基于文本中标识的对象标题模式创建一个新对象。 另外,模板包括一个或多个场指示器,每个场指示器具有对应的场模式。 场图案可以是正则表达式的格式。 字段类型和关联值是从与字段模式相关联的字符串创建的。

    Method and apparatus for supporting functionality documentation
    8.
    发明申请
    Method and apparatus for supporting functionality documentation 有权
    支持功能文档的方法和装置

    公开(公告)号:US20060059457A1

    公开(公告)日:2006-03-16

    申请号:US10940378

    申请日:2004-09-14

    IPC分类号: G06F9/44

    CPC分类号: G06F8/73

    摘要: A method identifies code to be analyzed and analyzes the identified code. The method determines whether the identified code contains a particular function. If the identified code contains the particular function, a determination is made whether the particular function has been properly documented. Additionally, a message is generated indicating improper documentation of the particular function if the particular function has not been documented.

    摘要翻译: 一种方法识别要分析的代码,并分析识别的代码。 该方法确定所识别的代码是否包含特定的功能。 如果识别的代码包含特定功能,则确定特定功能是否已被正确记录。 此外,如果没有记录特定功能,则会生成一条消息,指示不正确地记录特定功能。

    PROCESSING IDENTITY CONSTRAINTS IN A DATA STORE
    9.
    发明申请
    PROCESSING IDENTITY CONSTRAINTS IN A DATA STORE 有权
    处理数据存储中的身份限制

    公开(公告)号:US20090300033A1

    公开(公告)日:2009-12-03

    申请号:US12131141

    申请日:2008-06-02

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30923

    摘要: Various technologies and techniques are disclosed for processing identity constraints in a relational database. Values are extracted from an XML document during a submit operation. References that potentially participate in an identity constraint are identified. The reference information is stored. An identity constraint graph is generated from the stored reference information. Techniques for facilitating key-sequence comparisons are described. Techniques for identifying violations to identity constraints are described. Techniques for identifying which identity constraint graphs are affected by a new or changed document are described.

    摘要翻译: 公开了用于处理关系数据库中的身份约束的各种技术和技术。 在提交操作期间,从XML文档中提取值。 识别潜在参与身份约束的参考。 存储参考信息。 从存储的参考信息生成身份约束图。 描述了促进键序列比较的技术。 描述了识别违反身份约束的技术。 描述用于识别哪些身份约束图受新的或改变的文档影响的技术。

    Processing identity constraints in a data store
    10.
    发明授权
    Processing identity constraints in a data store 有权
    处理数据存储中的身份约束

    公开(公告)号:US08595263B2

    公开(公告)日:2013-11-26

    申请号:US12131141

    申请日:2008-06-02

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30923

    摘要: Various technologies and techniques are disclosed for processing identity constraints in a relational database. Values are extracted from an XML document during a submit operation. References that potentially participate in an identity constraint are identified. The reference information is stored. An identity constraint graph is generated from the stored reference information. Techniques for facilitating key-sequence comparisons are described. Techniques for identifying violations to identity constraints are described. Techniques for identifying which identity constraint graphs are affected by a new or changed document are described.

    摘要翻译: 公开了用于处理关系数据库中的身份约束的各种技术和技术。 在提交操作期间,从XML文档中提取值。 识别潜在参与身份约束的参考。 存储参考信息。 从存储的参考信息生成身份约束图。 描述了促进键序列比较的技术。 描述了识别违反身份约束的技术。 描述用于识别哪些身份约束图受新的或改变的文档影响的技术。