Method of using an encapsulated data signature for virtualization layer activation
    1.
    发明授权
    Method of using an encapsulated data signature for virtualization layer activation 有权
    使用封装数据签名进行虚拟化层激活的方法

    公开(公告)号:US08438555B1

    公开(公告)日:2013-05-07

    申请号:US12551196

    申请日:2009-08-31

    IPC分类号: G06F9/44

    CPC分类号: G06F17/30091

    摘要: A system and method for opening a file in a virtualization workspace of a host computer system. The host computer system includes a virtualization workspace including a virtualization agent and virtual software layers. The virtualization agent detects a request to open a file in the virtualization workspace. In response to detecting the request, the virtualization agent determines that the file includes embedded metadata. The virtualization agent uses the embedded metadata to identify a virtual software layer in which to open the file, activates the virtual software layer, and opens the file using an application that is included in the identified virtual software layer. The virtual software layer includes one or more applications and the embedded metadata includes a signature corresponding to one of the applications with which to open the file. The identified virtual software layer is installed on the host computer system subsequent to being identified.

    摘要翻译: 用于在主计算机系统的虚拟化工作空间中打开文件的系统和方法。 主计算机系统包括虚拟化工作区,其中包括虚拟代理和虚拟软件层。 虚拟化代理检测虚拟化工作区中打开文件的请求。 响应于检测到请求,虚拟代理确定该文件包括嵌入式元数据。 虚拟化代理使用嵌入式元数据来识别在其中打开文件的虚拟软件层,激活虚拟软件层,并使用所标识的虚拟软件层中包含的应用程序打开文件。 虚拟软件层包括一个或多个应用程序,并且嵌入式元数据包括与要打开该文件的应用程序之一相对应的签名。 识别的虚拟软件层在被识别之后安装在主机系统上。

    Systems and methods for enforcing geolocation-based policies
    2.
    发明授权
    Systems and methods for enforcing geolocation-based policies 有权
    用于执行基于地理位置的策略的系统和方法

    公开(公告)号:US09038158B1

    公开(公告)日:2015-05-19

    申请号:US13178225

    申请日:2011-07-07

    申请人: Paul MacKay

    发明人: Paul MacKay

    摘要: A computer-implemented method for enforcing geolocation-based policies may include (1) identifying a request from a computing system to access a computing resource, (2) identifying a public key certificate associated with the computing resource, the public key certificate including location data that indicates where the computing resource may be accessed from, (3) determining a current location of the computing system, (4) determining that the location data within the public key certificate indicates that the computing resource may be accessed from the current location of the computing system, and (5) allowing access to the computing resource based on the determination that the computing resource may be accessed from the current location of the computing system. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于实施基于地理位置的策略的计算机实现的方法可以包括(1)识别来自计算系统的访问计算资源的请求,(2)识别与计算资源相关联的公钥证书,所述公钥证书包括位置数据 (3)确定计算系统的当前位置,(4)确定公开密钥证书内的位置数据指示计算资源可以从当前位置访问 计算系统,以及(5)基于从计算系统的当前位置可以访问计算资源的确定,允许访问计算资源。 还公开了各种其它方法,系统和计算机可读介质。