Methods and apparatus for patching software in accordance with instituted patching policies
    1.
    发明授权
    Methods and apparatus for patching software in accordance with instituted patching policies 有权
    根据制定的修补策略修补软件的方法和装置

    公开(公告)号:US08271966B2

    公开(公告)日:2012-09-18

    申请号:US12133546

    申请日:2008-06-05

    IPC分类号: G06F9/44

    CPC分类号: G06F9/4484

    摘要: Techniques are disclosed for controlling software patching activity. Techniques may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted. Patching may be performed when convenient; or just before when the software requiring the patch is needed; or patching may be blocked to prevent unwanted software characteristics and/or behavior. Patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. A particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.

    摘要翻译: 公开了用于控制软件修补活动的技术。 技术可以实现软件外壳并制定修补策略来控制修补活动。 当实施时,软件shell作为屏障,只有当修补活动符合建立的修补策略时,才能修补底层软件。 可以制定各种修补政策。 可以方便地进行修补; 或者在需要补丁需要的软件之前; 或者修补可能被阻止,以防止不必要的软件特性和/或行为。 补丁可能会延迟,直到在新补丁中建立置信度,以避免中断已经以可接受的方式运作的计算机系统。 可以阻止特定的软件动作,以避免必须修补软件,特别是当该动作可能中断计算机系统的有序功能时。

    Methods and Apparatus for Patching Software in Accordance with Instituted Patching Policies
    3.
    发明申请
    Methods and Apparatus for Patching Software in Accordance with Instituted Patching Policies 有权
    根据制定的补丁政策来修补软件的方法和装置

    公开(公告)号:US20080235678A1

    公开(公告)日:2008-09-25

    申请号:US12133546

    申请日:2008-06-05

    IPC分类号: G06F9/44

    CPC分类号: G06F9/4484

    摘要: The present invention concerns methods and apparatus for controlling software patching activity in, for example, computer systems. Methods and apparatus of the present invention may implement a software shell and institute a patching policy to control patching activities. When implemented, the software shell acts as a barrier which permits patching of the underlying software only when the patching activity would be in accordance with the instituted patching policy. Various patching policies can be instituted in embodiments of the present invention. For example, patching may be done when convenient; or just before when software characteristics and/or behavior. In other circumstances, patching may be delayed until confidence has been established in a new patch so as to avoid disrupting a computer system that is already functioning in an acceptable manner. In still further circumstances, a particular software action may be blocked so as to avoid the necessity of having to patch software, particularly when the action may interrupt the orderly function of a computer system.

    摘要翻译: 本发明涉及用于控制例如计算机系统中的软件补丁活动的方法和装置。 本发明的方法和装置可以实现软件外壳并且制定修补策略来控制修补活动。 当实施时,软件shell作为屏障,只有当修补活动符合建立的修补策略时,才能修补底层软件。 可以在本发明的实施例中提出各种修补策略。 例如,可以在方便时进行修补; 或者在软件特性和/或行为之前。 在其他情况下,修补可能会延迟,直到在新补丁中建立置信度,以避免中断已经以可接受的方式运作的计算机系统。 在另外的情况下,可能会阻止特定的软件动作,以避免必须对软件进行补丁,特别是当该动作可能中断计算机系统的有序功能时。

    Methods and Apparatus for Implementing Context-Dependent File Security
    4.
    发明申请
    Methods and Apparatus for Implementing Context-Dependent File Security 审中-公开
    用于实现上下文相关文件安全的方法和装置

    公开(公告)号:US20080235806A1

    公开(公告)日:2008-09-25

    申请号:US12131351

    申请日:2008-06-02

    IPC分类号: H04L9/32

    CPC分类号: G06F21/6218 G06F2221/2141

    摘要: The present invention concerns methods and apparatus for implementing context-dependent security for files and other computer system resources. In particular, methods and apparatus of the present invention implement context-based permissions that are used in context-dependent file security. In examples of the present invention, the context-based permissions may allow access to a file only when an attempt to access the file is made at a certain time of day, or from an authorized computer system, or from a computer having a certain application program installed. In general terms, the context-based permissions may specify time, location and application information that either alone or in combination may be used to restrict access to a file.

    摘要翻译: 本发明涉及用于为文件和其他计算机系统资源实现上下文相关安全性的方法和装置。 特别地,本发明的方法和装置实现了在上下文相关文件安全性中使用的基于上下文的权限。 在本发明的示例中,基于上下文的许可只允许在一天中的特定时间或从授权的计算机系统或具有特定应用的计算机进行访问文件时访问文件 程序安装。 一般来说,基于上下文的权限可以指定时间,位置和应用信息,其可以单独地或组合地用于限制对文件的访问。

    Systems and methods for event detection
    5.
    发明授权
    Systems and methods for event detection 失效
    事件检测的系统和方法

    公开(公告)号:US07475135B2

    公开(公告)日:2009-01-06

    申请号:US11096659

    申请日:2005-03-31

    IPC分类号: G06F15/173

    摘要: A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.

    摘要翻译: 系统访问多个计算系统上的事件日志,并扫描这些日志,以确定各种兴趣,事件或问题的可能原因。 这些感兴趣的项目通常包括计算机系统的不正当或令人沮丧的行为,但也可能包括用户,用户组,公司,服务或帮助台寻求原因的令人愉快或有益的行为。 一旦找到感兴趣的项目的可能来源,可以进行测试来确认问题的根源,并采取警告或纠正措施。

    SYSTEMS AND METHODS FOR EVENT DETECTION
    9.
    发明申请
    SYSTEMS AND METHODS FOR EVENT DETECTION 审中-公开
    用于事件检测的系统和方法

    公开(公告)号:US20080276131A1

    公开(公告)日:2008-11-06

    申请号:US12177266

    申请日:2008-07-22

    IPC分类号: G06F11/00 G06F11/34

    摘要: A system accesses a log of events on more than one computing system and scans these logs in an effort to determine the likely cause of various items of interest, events, or problems. These items of interest often include improper or frustrating behavior of a computer system, but may also include delightful or beneficial behaviors for which a user, group of users, company, service, or help desk seeks a cause. Once the likely source of the item of interest is found, a test may be performed to confirm the source of the problem and warning or corrective action taken.

    摘要翻译: 系统访问多个计算系统上的事件日志,并扫描这些日志,以确定各种兴趣,事件或问题的可能原因。 这些感兴趣的项目通常包括计算机系统的不正当或令人沮丧的行为,但也可能包括用户,用户组,公司,服务或帮助台寻求原因的令人愉快或有益的行为。 一旦找到感兴趣的项目的可能来源,可以进行测试来确认问题的根源,并采取警告或纠正措施。