User controls for a computer
    1.
    发明授权
    User controls for a computer 有权
    计算机的用户控件

    公开(公告)号:US07356836B2

    公开(公告)日:2008-04-08

    申请号:US10186014

    申请日:2002-06-28

    IPC分类号: G06F21/00 G06F15/16

    CPC分类号: G06F21/604

    摘要: This invention is directed to provide a method for enabling an administrator to monitor and selectively limit the computer functions available to a user. The method is carried out on a personal computer by an administrator, and administrator decisions can be enforced on other personal computers in a local network. The invention enables an administrator to restrict a user's logon hours, logon duration, access to computer functions, and access to applications based on content rating. In addition, the administrator may temporarily restrict or extend normally allowed access privileges. The invention also allows for the monitoring, auditing, and reporting of a user's computer function usage to an administrator.

    摘要翻译: 本发明旨在提供一种使管理员能够监视和选择性地限制用户可用的计算机功能的方法。 该方法由管理员在个人计算机上执行,并且可以在本地网络中的其他个人计算机上实施管理员决定。 本发明使管理员能够限制用户的登录时间,登录持续时间,访问计算机功能以及基于内容分级访问应用程序。 此外,管理员可以临时限制或扩展正常允许的访问权限。 本发明还允许对用户的计算机功能使用的监视,审计和报告给管理员。

    User controls for a computer
    2.
    发明授权
    User controls for a computer 有权
    计算机的用户控件

    公开(公告)号:US07818789B2

    公开(公告)日:2010-10-19

    申请号:US12019438

    申请日:2008-01-24

    IPC分类号: G06F21/00 G06F15/16

    CPC分类号: G06F21/604

    摘要: This invention is directed to provide a method for enabling an administrator to monitor and selectively limit the computer functions available to a user. The method is carried out on a personal computer by an administrator, and administrator decisions can be enforced on other personal computers in a local network. The invention enables an administrator to restrict a user's logon hours, logon duration, access to computer functions, and access to applications based on content rating. In addition, the administrator may temporarily restrict or extend normally allowed access privileges. The invention also allows for the monitoring, auditing, and reporting of a user's computer function usage to an administrator.

    摘要翻译: 本发明旨在提供一种使管理员能够监视和选择性地限制用户可用的计算机功能的方法。 该方法由管理员在个人计算机上执行,并且可以在本地网络中的其他个人计算机上执行管理员决定。 本发明使管理员能够限制用户的登录时间,登录持续时间,访问计算机功能以及基于内容分级访问应用程序。 此外,管理员可以临时限制或扩展正常允许的访问权限。 本发明还允许对用户的计算机功能使用的监视,审计和报告给管理员。

    Method and system for controlling access privileges for trusted network nodes
    4.
    发明授权
    Method and system for controlling access privileges for trusted network nodes 失效
    用于控制可信网络节点访问权限的方法和系统

    公开(公告)号:US08230485B2

    公开(公告)日:2012-07-24

    申请号:US10941559

    申请日:2004-09-15

    IPC分类号: G06F7/04

    摘要: A system and method for controlling access to a computer provides for loose security within a local network while retaining strong security against external access to the network. In one embodiment, a user has access to trusted nodes in a secured group within an unmanaged network, without being required to choose, enter and remember a login password. To establish such a secure blank password or one-click logon account for the user on a computer, a strong random password is generated and stored, and the account is designated as a blank password account. If the device is part of a secured network group, the strong random password is replicated to the other trusted nodes. When a user with a blank password account wishes to log in to a computer, the stored strong random password is retrieved and the user is authenticated.

    摘要翻译: 用于控制对计算机的访问的系统和方法提供本地网络中的松散安全性,同时保持对网络的外部访问的强大的安全性。 在一个实施例中,用户可以访问非托管网络内的安全组中的可信节点,而不需要选择,输入和记住登录密码。 要在计算机上为用户建立一个安全的空白密码或一键登录帐户,将生成并存储一个强大的随机密码,并将该帐户指定为空白密码帐户。 如果设备是安全网络组的一部分,则强大的随机密码将复制到其他可信节点。 当具有空白密码帐户的用户希望登录到计算机时,检索所存储的强随机密码,并对用户进行认证。

    Method and system for synchronizing data shared among peer computing devices
    8.
    发明授权
    Method and system for synchronizing data shared among peer computing devices 有权
    用于同步对等计算设备共享的数据的方法和系统

    公开(公告)号:US07743022B2

    公开(公告)日:2010-06-22

    申请号:US10376430

    申请日:2003-02-28

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30176

    摘要: Disclosed is a data synchronization service for use in a peer-to-peer computing environment. Selected data objects are copied onto selected computing devices. A service running on each device monitors data objects for changes. When a change is detected, the service sends a change notification to the other devices so that they can update their copies of the data object. A user can access a data object from any device, knowing that he will retrieve the latest version of the data object. Instead of incurring the costs of storing a large file on every device, a user “ghosts” the file on some devices. A ghosting device stores only metadata about the file rather than the entire file. The user accesses the file through the ghost: access requests are sent to a device that holds the actual contents, and those contents are presented to the user as if they were stored locally.

    摘要翻译: 公开了一种用于对等计算环境的数据同步服务。 选定的数据对象被复制到选定的计算设备上。 每个设备上运行的服务会监视数据对象进行更改。 当检测到更改时,服务向其他设备发送更改通知,以便它们可以更新其数据对象的副本。 用户可以从任何设备访问数据对象,知道他将检索最新版本的数据对象。 用户在某些设备上“复制”文件,而不是在每个设备上存储大文件的费用。 重影设备仅存储有关文件的元数据,而不是整个文件。 用户通过ghost访问文件:访问请求被发送到保存实际内容的设备,并且这些内容被呈现给用户,就像它们被存储在本地一样。

    System and method for implementing group policy
    9.
    发明授权
    System and method for implementing group policy 失效
    实施群策略的系统和方法

    公开(公告)号:US06950818B2

    公开(公告)日:2005-09-27

    申请号:US10254155

    申请日:2002-09-24

    IPC分类号: G06F21/00 H04L29/06 G06F17/30

    摘要: A method and system for implementing policy by accumulating policies for a policy recipient from policy objects associated with a hierarchically organized structure of containers, such as directory containers (sites, domains and organizational units) that includes the policy recipient. Based on administrator input, policy settings for the policy recipient may be accumulated into a specific order by inheriting policy from higher containers, which may enforce their policy settings over those of lower containers. Policy that is not enforced may be blocked at a container. The result is an accumulated set of group policy objects that are ordered by relative strength to resolve any policy conflicts. Policy may be applied to a policy recipient by calling extensions, such as an extension that layers the policy settings into the registry or an extension that uses policy information from the objects according to the ordering thereof.

    摘要翻译: 通过从包含策略接收者的诸如目录容器(站点,域和组织单位)的层次结构的容器相关联的策略对象累积策略收件人的策略来实现策略的方法和系统。 基于管理员输入,策略收件人的策略设置可以通过继承来自较高容器的策略来累积到特定的顺序,这可能会对低级容器的策略设置执行策略设置。 未强制执行的策略可能会在容器中被阻止。 结果是通过相对强度排序的一组累积的组策略对象来解决任何策略冲突。 策略可以通过调用扩展来应用于策略接收者,例如将策略设置分层到注册表中的扩展或者根据其顺序使用来自对象的策略信息的扩展。

    System and method for implementing group policy
    10.
    发明授权
    System and method for implementing group policy 有权
    实施群策略的系统和方法

    公开(公告)号:US06466932B1

    公开(公告)日:2002-10-15

    申请号:US09268455

    申请日:1999-03-16

    IPC分类号: G06F1730

    摘要: A method and system for implementing policy by accumulating policies for a policy recipient from policy objects associated with a hierarchically organized structure of containers, such as directory containers (sites, domains and organizational units) that includes the policy recipient. Based on administrator input, policy settings for the policy recipient may be accumulated into a specific order by inheriting policy from higher containers, which may enforce their policy settings over those of lower containers. Policy that is not enforced may be blocked at a container. The result is an accumulated set of group policy objects that are ordered by relative strength to resolve any policy conflicts. Policy may be applied to a policy recipient by calling extensions, such as an extension that layers the policy settings into the registry or an extension that uses policy information from the objects according to the ordering thereof. Linking of group policy objects to one or more containers (e.g., sites, domains and organizational units) is provided, as is exception management. The effects of group policy may be filtered based on users' or computers' membership in security groups.

    摘要翻译: 通过从包含策略接收者的诸如目录容器(站点,域和组织单位)的层次结构的容器相关联的策略对象累积策略收件人的策略来实现策略的方法和系统。 基于管理员输入,策略收件人的策略设置可以通过继承来自较高容器的策略来累积到特定的顺序,这可能会对低级容器的策略设置执行策略设置。 未强制执行的策略可能会在容器中被阻止。 结果是通过相对强度排序的一组累积的组策略对象来解决任何策略冲突。 策略可以通过调用扩展来应用于策略接收者,例如将策略设置分层到注册表中的扩展或者根据其顺序使用来自对象的策略信息的扩展。 提供组策略对象与一个或多个容器(例如,站点,域和组织单元)的链接,异常管理也是如此。 组策略的效果可能会根据用户或计算机在安全组中的成员资格进行过滤。