CLOUD SCALE DIRECTORY SERVICES
    1.
    发明申请
    CLOUD SCALE DIRECTORY SERVICES 有权
    云计算目录服务

    公开(公告)号:US20110145526A1

    公开(公告)日:2011-06-16

    申请号:US12635028

    申请日:2009-12-10

    IPC分类号: G06F12/16

    摘要: Embodiments described herein are directed to providing scalability to software applications. A computer system partitions a portion of data stored in a directory services system into multiple different data partitions. Each data partition includes a primary writable copy and at least one secondary read-only copy of the data. The computer system receives a client request for a portion of the data that is stored in the directory services system and accesses various stored partition mappings to determine which of the different data partitions includes the requested data. The computer system also accesses a dynamic copy locator to determine which of the read-only copies of the indicated partition to access and provide the accessed primary writeable copy of the indicated partition and the determined read-only copy to the client in a virtualized manner so that the client is not aware of the data partitions.

    摘要翻译: 本文描述的实施例旨在提供对软件应用的可扩展性。 计算机系统将存储在目录服务系统中的数据的一部分分成多个不同的数据分区。 每个数据分区包括主要可写入副本和数据的至少一个次要只读副本。 计算机系统接收对存储在目录服务系统中的一部分数据的客户端请求,并访问各种存储的分区映射,以确定哪个不同的数据分区包括所请求的数据。 计算机系统还访问动态复制定位器,以确定指定分区的哪些只读副本访问,并以虚拟化的方式将指定分区和所确定的只读副本的访问主可写副本提供给客户端 客户端不知道数据分区。

    Automatic allocation of data replicas
    2.
    发明授权
    Automatic allocation of data replicas 有权
    自动分配数据副本

    公开(公告)号:US08645660B2

    公开(公告)日:2014-02-04

    申请号:US12635028

    申请日:2009-12-10

    IPC分类号: G06F12/02 G06F12/16

    摘要: Embodiments described herein are directed to providing scalability to software applications. A computer system partitions a portion of data stored in a directory services system into multiple different data partitions. Each data partition includes a primary writable copy and at least one secondary read-only copy of the data. The computer system receives a client request for a portion of the data that is stored in the directory services system and accesses various stored partition mappings to determine which of the different data partitions includes the requested data. The computer system also accesses a dynamic copy locator to determine which of the read-only copies of the indicated partition to access and provide the accessed primary writeable copy of the indicated partition and the determined read-only copy to the client in a virtualized manner so that the client is not aware of the data partitions.

    摘要翻译: 本文描述的实施例旨在提供对软件应用的可扩展性。 计算机系统将存储在目录服务系统中的数据的一部分分成多个不同的数据分区。 每个数据分区包括主要可写入副本和数据的至少一个次要只读副本。 计算机系统接收对存储在目录服务系统中的一部分数据的客户端请求,并访问各种存储的分区映射,以确定哪个不同的数据分区包括所请求的数据。 计算机系统还访问动态复制定位器,以确定指定分区的哪些只读副本访问,并以虚拟化的方式将指定分区和所确定的只读副本的访问主可写副本提供给客户端 客户端不知道数据分区。

    System and method for distinguishing safe and potentially unsafe data during runtime processing
    3.
    发明申请
    System and method for distinguishing safe and potentially unsafe data during runtime processing 有权
    在运行时处理期间区分安全和潜在不安全数据的系统和方法

    公开(公告)号:US20060277604A1

    公开(公告)日:2006-12-07

    申请号:US11133676

    申请日:2005-05-20

    IPC分类号: G06F12/14

    CPC分类号: G06F21/52

    摘要: The techniques and mechanisms described herein are directed to a taint mechanism. An object-based command declares a taint directive for a parameter within a command declaration. The taint directive is then associated with that parameter in a manner such that when an engine processes the command, the engine determines whether to process the command based on the taint directive and input for the parameter. The taint directive may specify that the input may be tainted or untainted. The command declaration may also include a taint parameter that specifies a taint characteristic for output from the command. The taint characteristic may be tainted, untainted, or propagated. Any type of object may become tainted. An untaint process may be applied to tainted data to obtain untainted data if an authorization check performed by the engine is successful.

    摘要翻译: 本文描述的技术和机制针对污染机制。 基于对象的命令在命令声明中声明一个参数的污点指令。 然后,污染指令以这样的方式与该参数相关联,使得当引擎处理命令时,引擎根据污点指令和参数的输入来确定是否处理命令。 污点指令可能指定输入可能被污染或未被保留。 命令声明还可以包括一个污染参数,该参数指定了从命令输出的污点特性。 污点特性可能会被污染,未被维护或传播。 任何类型的物体可能会被污染。 如果发动机执行的授权检查成功,则可以将污染过程应用于污染数据以获得未维护的数据。

    Method and apparatus for supporting functionality documentation
    4.
    发明申请
    Method and apparatus for supporting functionality documentation 有权
    支持功能文档的方法和装置

    公开(公告)号:US20060059457A1

    公开(公告)日:2006-03-16

    申请号:US10940378

    申请日:2004-09-14

    IPC分类号: G06F9/44

    CPC分类号: G06F8/73

    摘要: A method identifies code to be analyzed and analyzes the identified code. The method determines whether the identified code contains a particular function. If the identified code contains the particular function, a determination is made whether the particular function has been properly documented. Additionally, a message is generated indicating improper documentation of the particular function if the particular function has not been documented.

    摘要翻译: 一种方法识别要分析的代码,并分析识别的代码。 该方法确定所识别的代码是否包含特定的功能。 如果识别的代码包含特定功能,则确定特定功能是否已被正确记录。 此外,如果没有记录特定功能,则会生成一条消息,指示不正确地记录特定功能。

    PROCESSING IDENTITY CONSTRAINTS IN A DATA STORE
    5.
    发明申请
    PROCESSING IDENTITY CONSTRAINTS IN A DATA STORE 有权
    处理数据存储中的身份限制

    公开(公告)号:US20090300033A1

    公开(公告)日:2009-12-03

    申请号:US12131141

    申请日:2008-06-02

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30923

    摘要: Various technologies and techniques are disclosed for processing identity constraints in a relational database. Values are extracted from an XML document during a submit operation. References that potentially participate in an identity constraint are identified. The reference information is stored. An identity constraint graph is generated from the stored reference information. Techniques for facilitating key-sequence comparisons are described. Techniques for identifying violations to identity constraints are described. Techniques for identifying which identity constraint graphs are affected by a new or changed document are described.

    摘要翻译: 公开了用于处理关系数据库中的身份约束的各种技术和技术。 在提交操作期间,从XML文档中提取值。 识别潜在参与身份约束的参考。 存储参考信息。 从存储的参考信息生成身份约束图。 描述了促进键序列比较的技术。 描述了识别违反身份约束的技术。 描述用于识别哪些身份约束图受新的或改变的文档影响的技术。

    Processing identity constraints in a data store
    7.
    发明授权
    Processing identity constraints in a data store 有权
    处理数据存储中的身份约束

    公开(公告)号:US08595263B2

    公开(公告)日:2013-11-26

    申请号:US12131141

    申请日:2008-06-02

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30923

    摘要: Various technologies and techniques are disclosed for processing identity constraints in a relational database. Values are extracted from an XML document during a submit operation. References that potentially participate in an identity constraint are identified. The reference information is stored. An identity constraint graph is generated from the stored reference information. Techniques for facilitating key-sequence comparisons are described. Techniques for identifying violations to identity constraints are described. Techniques for identifying which identity constraint graphs are affected by a new or changed document are described.

    摘要翻译: 公开了用于处理关系数据库中的身份约束的各种技术和技术。 在提交操作期间,从XML文档中提取值。 识别潜在参与身份约束的参考。 存储参考信息。 从存储的参考信息生成身份约束图。 描述了促进键序列比较的技术。 描述了识别违反身份约束的技术。 描述用于识别哪些身份约束图受新的或改变的文档影响的技术。

    Mechanism for converting text output into objects

    公开(公告)号:US20060064672A1

    公开(公告)日:2006-03-23

    申请号:US10944459

    申请日:2004-09-17

    IPC分类号: G06F9/44

    CPC分类号: G06F17/248

    摘要: The techniques and mechanisms described herein are directed at converting text into objects based on a template that describes the format of the text. The objects then being available for further processing. The conversion mechanism converts the text into an object having at least one method that is directly invocable and that is specific to a data type specified for the live object. The template comprises an object header indicator and a corresponding object header pattern. A new object is created whenever the object header pattern is identified within the text. In addition, the template comprises one or more field indicators each having a corresponding field pattern. The field pattern is in a format of a regular expression. A new field is created for the new object whenever a field pattern is identified within the text.

    Security mechanism for interpreting scripts in an interpretive environment

    公开(公告)号:US20060225036A1

    公开(公告)日:2006-10-05

    申请号:US11096623

    申请日:2005-03-31

    IPC分类号: G06F9/44

    CPC分类号: G06F9/45508

    摘要: The techniques and mechanisms described herein are directed to a scripting security mechanism that minimizes security risks associated with interpreting a script written with a scripting language. An interpreter recognizes the scripting-language syntax within the script and processes each line that is designated within a data block using a restrictive set of operations. The restrictive set of operations are a subset of the total operations available for processing. If one of the lines within the data block attempts to perform an operation that is not within the restrictive set of operations, the interpreter provides an indication, such as an exception or message explaining the illegal operation. The interpreter also recognizes a list of export variables associated with the data block and exports only the variables identified in the list to an external environment if the export variable meets a constraint identified for it, if any.

    System and Method for Storing Events to Enhance Intrusion Detection
    10.
    发明申请
    System and Method for Storing Events to Enhance Intrusion Detection 有权
    存储事件以增强入侵检测的系统和方法

    公开(公告)号:US20060101101A1

    公开(公告)日:2006-05-11

    申请号:US11275446

    申请日:2006-01-03

    IPC分类号: G06F12/00 G06F17/30

    摘要: Storing events to enhance intrusion detection in networks is described. In one exemplary implementation, an event is received. The event includes a data section containing a set of strings each having an event field. A definition table is referenced to determine locations of event fields in the data section of the event. The event fields are stored in a database record corresponding to event field locations referenced from the definition table.

    摘要翻译: 描述了存储事件以增强网络中的入侵检测。 在一个示例性实现中,接收事件。 该事件包括一个包含一组每个具有事件字段的字符串的数据部分。 引用定义表来确定事件数据部分中事件字段的位置。 事件字段存储在对应于从定义表引用的事件字段位置的数据库记录中。