Ordering of web search results
    3.
    发明申请
    Ordering of web search results 审中-公开
    订购网页搜索结果

    公开(公告)号:US20050114317A1

    公开(公告)日:2005-05-26

    申请号:US10723498

    申请日:2003-11-26

    IPC分类号: G06F7/00 G06F17/30

    CPC分类号: G06F16/951

    摘要: The ordered results set of a search engine based upon a search statement are processed to identify pages exhibiting patterns related to a recurring event. These pages are ranked and the ordered results set is reordered with the ranked pages appearing before those that do not exhibit the respective pattern.

    摘要翻译: 处理基于搜索语句的搜索引擎的有序结果集合以识别出现与循环事件有关的模式的页面。 这些页面被排序,并且排序的结果集被重新排序,排列的页面出现在不呈现相应图案的页面之前。

    Optimal use of triggers for detecting database events
    4.
    发明申请
    Optimal use of triggers for detecting database events 有权
    最佳使用触发器来检测数据库事件

    公开(公告)号:US20050125371A1

    公开(公告)日:2005-06-09

    申请号:US10729166

    申请日:2003-12-05

    IPC分类号: G06F7/00 G06F17/30

    CPC分类号: G06F17/30368

    摘要: Triggers are dynamically created and destroyed on an application database. Rules are represented in active databases as ECA (event-condition-action) items, in which an action formulates a reaction to an event and is executed after the rule is triggered when the condition is evaluated to true. The event is defined as an instantaneous and atomic (that is, the event either happens completely, or not at all) point of occurrence within an application. Events can be classified as either database, temporal, or user-defined events, and their type can be either primitive or composite.

    摘要翻译: 触发器在应用程序数据库上动态创建和销毁。 规则在活动数据库中表示为ECA(事件 - 条件 - 操作)项,其中动作形成对事件的反应,并且在条件被评估为true时触发规则之后执行。 该事件被定义为应用程序中的即时和原子(即事件完全发生或完全不发生)发生。 事件可以被分类为数据库,时间或用户定义的事件,它们的类型可以是原始的或复合的。

    Software installation in multiple operating systems
    5.
    发明申请
    Software installation in multiple operating systems 失效
    软件安装在多个操作系统中

    公开(公告)号:US20070011672A1

    公开(公告)日:2007-01-11

    申请号:US11175742

    申请日:2005-07-06

    IPC分类号: G06F9/445

    CPC分类号: G06F8/61 G06F9/441

    摘要: A software application can be installed under one operating system, and accessed for execution by a second operating system compatible with the first operating system by identifying and making appropriate changes to system parameters in the second operating system. The two operating systems may be installed on the same of different machines. A record can be made of changes in system parameters that are made upon installation of the software application in the first operating system as a basis for making appropriate changes in the system parameters of the second operating system to allow the software application to be accessed for execution from the second operating system.

    摘要翻译: 可以在一个操作系统下安装软件应用程序,并通过识别并对第二操作系统中的系统参数进行适当的改变来访问与第一操作系统兼容的第二操作系统执行。 两个操作系统可以安装在相同的不同机器上。 可以记录在第一操作系统中安装软件应用程序时所做的系统参数的更改,作为对第二操作系统的系统参数进行适当更改的基础,以允许软件应用程序被访问以执行 从第二个操作系统。

    Generic declarative authorization scheme for Java
    6.
    发明申请
    Generic declarative authorization scheme for Java 失效
    Java的通用声明授权方案

    公开(公告)号:US20060026667A1

    公开(公告)日:2006-02-02

    申请号:US10909107

    申请日:2004-07-30

    IPC分类号: H04L9/00

    CPC分类号: G06F21/121

    摘要: A method, system, and program storage device for establishing security and authorization policies for users accessing a software application, wherein the method comprises generating at least one application object group from an application object description document comprising an XML format run on a data processor; creating an authorization policy for each application object; sending a selected application object group to an access controller; and establishing access control parameters at a time of deployment of the software application for users attempting to access the selected application object group based on the authorization policy. The method further comprises specifying environmental variables for the authorization policy; changing the authorization policy by modifying a declarative specification of the environmental variables and modifying constraints defined on attributes of an application object; implementing varied classes of authorization policies using a same authorization policy classifier; and specifying the application object group using grouping parameters.

    摘要翻译: 一种用于为访问软件应用程序的用户建立安全和授权策略的方法,系统和程序存储设备,其中该方法包括从包括在数据处理器上运行的XML格式的应用对象描述文档生成至少一个应用对象组; 为每个应用程序对象创建授权策略; 将所选择的应用对象组发送到访问控制器; 以及在为所述授权策略访问所选择的应用对象组的用户部署所述软件应用时建立访问控制参数。 该方法还包括指定授权策略的环境变量; 通过修改环境变量的声明性规范并修改在应用程序对象的属性上定义的约束来更改授权策略; 使用相同的授权策略分类器来实现各种授权策略; 并使用分组参数指定应用程序对象组。

    Policy implementation delegation
    7.
    发明申请
    Policy implementation delegation 审中-公开
    政策实施委托

    公开(公告)号:US20060277594A1

    公开(公告)日:2006-12-07

    申请号:US11143033

    申请日:2005-06-02

    摘要: The present invention allows a user (e.g., a policy implementer) to be identified and delegated responsibility for implementing a policy. This can occur, implicitly, semi-implicitly or explicitly. In a typical embodiment, a policy provided (e.g., by a policy owner) is automatically parsed to determine a minimum set of access rights needed to implement the policy. For example, the policy might indicate that an implementing user only needs simple read privileges. Alternatively, the policy might require read/write privileges. In any event, a list (e.g., an access control list) will be analyzed to identify a set (e.g., one or more) of users of a computerized resource subject to the policy that meets the minimum set of access rights. Once this set of users has been identified, a hierarchy can be optionally analyzed to determine who among the set of users is permitted to implement the policy.

    摘要翻译: 本发明允许用户(例如,策略实现者)被识别并且委托执行策略的责任。 这可以隐含地,半隐式地或明确地发生。 在典型的实施例中,提供(例如由策略所有者)提供的策略被自动解析以确定实现策略所需的最小访问权限。 例如,策略可能表明实现用户只需要简单的读取权限。 或者,策略可能需要读/写权限。 在任何情况下,将分析列表(例如,访问控制列表)以识别受符合最小访问权限集合的策略的计算机化资源的集合(例如,一个或多个)的用户。 一旦这组用户被识别,就可以选择性地分析层次结构,以确定在一组用户中谁被允许实施策略。