Access trimmed user interface
    2.
    发明授权
    Access trimmed user interface 有权
    访问修剪用户界面

    公开(公告)号:US07503075B2

    公开(公告)日:2009-03-10

    申请号:US11035024

    申请日:2005-01-12

    IPC分类号: G06F21/22 G06F17/30

    摘要: Reducing the number of inquiries required to determine access rights accorded to documents, in particular documents stored at a Web site, is disclosed. Upon receipt of a request for documents, a list of the documents is opened by the receiving server and data denoting the user access level of every document on the list is determined. Then, the resulting series of access levels is filtered to remove any access levels not available to the requestor. Next, a document query, including as a condition that any returned list of documents only include documents having an access level included on the filtered series of access levels, is generated. The resulting document data is then embedded in a Web page and sent to the requestor.

    摘要翻译: 公布了确定获取文档的访问权限所需的查询数量,特别是存储在网站上的文档。 在接收到文件请求时,由接收服务器打开文档列表,确定表示列表中每个文档的用户访问级别的数据。 然后,过滤所得到的一系列访问级别,以删除请求者不可用的任何访问级别。 接下来,文档查询包括作为任何返回的文档列表的条件,仅包括具有包含在经过过滤的一系列访问级别的访问级别的文档。 然后将所得的文档数据嵌入到网页中并发送给请求者。

    Access trimmed user interface
    3.
    发明申请

    公开(公告)号:US20060156031A1

    公开(公告)日:2006-07-13

    申请号:US11035024

    申请日:2005-01-12

    IPC分类号: G06F12/14

    摘要: Reducing the number of inquiries required to determine access rights accorded to documents, in particular documents stored at a Web site, is disclosed. Upon receipt of a request for documents, a list of the documents is opened by the receiving server and data denoting the user access level of every document on the list is determined. Then, the resulting series of access levels is filtered to remove any access levels not available to the requestor. Next, a document query, including as a condition that any returned list of documents only include documents having an access level included on the filtered series of access levels, is generated. The resulting document data is then embedded in a Web page and sent to the requestor.

    Scalable Hosting of User Solutions
    4.
    发明申请
    Scalable Hosting of User Solutions 审中-公开
    可扩展的用户解决方案主机

    公开(公告)号:US20090235353A1

    公开(公告)日:2009-09-17

    申请号:US12049316

    申请日:2008-03-15

    IPC分类号: G06F21/20 G06F9/445 G06F9/46

    摘要: Scalable hosting of user solutions is provided. A system for hosting application software includes a local server, one or more remote servers, a configuration database and a content database. The local server includes a web front end module that processes a request from a client computer over the Internet to host application software on a server. The web front end module determines whether the local server or the one or more remote servers will host the application software. The remote server includes a back end module that manages the installation and operation of application software hosted the remote server. The configuration database includes topology information that has descriptions of the server computers that can host application software. The content database includes information on the content of the software applications to be hosted on a server computer.

    摘要翻译: 提供了可扩展的用户解决方案托管。 用于托管应用软件的系统包括本地服务器,一个或多个远程服务器,配置数据库和内容数据库。 本地服务器包括Web前端模块,其通过因特网处理来自客户端计算机的请求以在服务器上托管应用软件。 Web前端模块确定本地服务器或一个或多个远程服务器是否将承载应用软件。 远程服务器包括后端模块,用于管理托管远程服务器的应用软件的安装和操作。 配置数据库包括具有可托管应用软件的服务器计算机的描述的拓扑信息。 内容数据库包括关于要在服务器计算机上托管的软件应用的内容的信息。

    SECURE HOSTING FOR UNTRUSTED CODE
    5.
    发明申请
    SECURE HOSTING FOR UNTRUSTED CODE 审中-公开
    保护非侵权的代码

    公开(公告)号:US20100199357A1

    公开(公告)日:2010-08-05

    申请号:US12363791

    申请日:2009-02-02

    IPC分类号: G06F21/22

    CPC分类号: G06F21/57 G06F21/54

    摘要: Various technologies and techniques are disclosed for increasing security in execution environments. A system is described for handling DLL calls made from untrusted code. An execution environment instantiates a lower trust process when a high trust process determines a need to call untrusted code. When the untrusted code calls a method in an original DLL, the execution environment loads a shim DLL into the lower trust process. The shim DLL has a clone of the method from the original DLL. A method for increasing security when processing calls from untrusted code is described. A shim DLL is created from an original DLL, and is deployed so an execution environment will load the shim DLL instead of the original DLL. When an execution environment receives a call from a caller DLL to the original DLL, the call is routed through the shim DLL. A pluggable validation system is also described.

    摘要翻译: 为了提高执行环境的安全性,公开了各种技术和技术。 描述了一种用于处理由不受信任代码构成的DLL调用的系统。 当高信任过程确定需要调用不受信任的代码时,执行环境会实例化较低的信任过程。 当不可信代码调用原始DLL中的方法时,执行环境将一个垫片DLL加载到较低的信任过程中。 垫片DLL具有来自原始DLL的方法的克隆。 描述了在处理来自不可信代码的呼叫时增加安全性的方法。 一个垫片DLL是从一个原始的DLL创建的,并被部署,所以执行环境将加载垫片DLL,而不是原始的DLL。 当执行环境接收到从调用者DLL到原始DLL的调用时,调用将通过shim DLL进行路由。 还描述了可插拔验证系统。