SYSTEM AND METHOD FOR CONFIGURATION POLICY EXTRACTION
    1.
    发明申请
    SYSTEM AND METHOD FOR CONFIGURATION POLICY EXTRACTION 审中-公开
    用于配置政策提取的系统和方法

    公开(公告)号:US20140108625A1

    公开(公告)日:2014-04-17

    申请号:US14118235

    申请日:2011-05-20

    IPC分类号: H04L12/24

    摘要: A method for configuration policy extraction for an organization having a plurality of composite configuration items may include calculating distances in a configuration space between the composite configuration items. The method may also include clustering the composite configuration items into one or more dusters based on the calculated distances. The method may further include identifying configuration patterns in one or more of the clusters, and extracting at least one configuration policy based on the identified configuration patterns. A non-transitory computer readable medium and a system for configuration policy extraction for an organization having a plurality of composite configuration items are also disclosed.

    摘要翻译: 用于具有多个复合配置项的组织的配置策略提取的方法可以包括计算复合配置项之间的配置空间中的距离。 该方法还可以包括基于所计算的距离将复合配置项聚类成一个或多个喷粉器。 该方法还可以包括识别一个或多个集群中的配置模式,以及基于所识别的配置模式来提取至少一个配置策略。 还公开了一种非暂时计算机可读介质和用于具有多个复合配置项的组织的配置策略提取的系统。

    DETERMINING WHETHER A COMPOSITE CONFIGURATION ITEM SATISFIES A COMPLIANCE RULE
    2.
    发明申请
    DETERMINING WHETHER A COMPOSITE CONFIGURATION ITEM SATISFIES A COMPLIANCE RULE 审中-公开
    确定复合配置项目是否符合合规规则

    公开(公告)号:US20110296310A1

    公开(公告)日:2011-12-01

    申请号:US12788459

    申请日:2010-05-27

    IPC分类号: G06F15/177 G06N5/02

    CPC分类号: G06Q30/0621

    摘要: At least one selection relating to at least one element of a compliance rule is received through a user interface. The compliance rule is for a composite configuration item that has a collection of configuration items that are related to each other. Each of the configuration items represents a configuration of an information technology component. It is determined whether the composite configuration item satisfies the compliance rule, where the elements of the compliance rule are compared to the corresponding configuration items of the composite configuration item as part of the determining.

    摘要翻译: 通过用户界面接收至少一个与合规性规则的至少一个要素相关的选择。 合规规则适用于具有彼此相关的配置项集合的组合配置项。 每个配置项表示信息技术组件的配置。 确定复合配置项是否满足合规性规则,其中将合规性规则的元素与复合配置项的相应配置项进行比较,作为确定的一部分。

    AUTOMATED CONFIGURATION CHANGE AUTHORIZATION
    5.
    发明申请
    AUTOMATED CONFIGURATION CHANGE AUTHORIZATION 审中-公开
    自动配置更改授权

    公开(公告)号:US20130254524A1

    公开(公告)日:2013-09-26

    申请号:US13424844

    申请日:2012-03-20

    IPC分类号: G06F9/06

    CPC分类号: G06F9/44505

    摘要: A method for automated configuration change authorization may include automatically discovering configuration change events in an IT system over a period of time. The method may also include extracting configuration change event patterns from the discovered configuration change events over the period of time. The method may further include classifying a configuration change event set as corresponding to a configuration change event pattern of the extracted configuration change event patterns. The method may also include automatically authorizing the configuration change event set. A system and computer readable medium are also described.

    摘要翻译: 用于自动配置更改授权的方法可以包括在一段时间内自动发现IT系统中的配置改变事件。 该方法还可以包括在一段时间内从发现的配置改变事件中提取配置改变事件模式。 该方法还可以包括将配置改变事件集合分类为与所提取的配置改变事件模式的配置改变事件模式相对应。 该方法还可以包括自动授权配置改变事件集合。 还描述了系统和计算机可读介质。

    Controlling Access To A Computer System
    6.
    发明申请
    Controlling Access To A Computer System 审中-公开
    控制对计算机系统的访问

    公开(公告)号:US20120233220A1

    公开(公告)日:2012-09-13

    申请号:US13042649

    申请日:2011-03-08

    IPC分类号: G06F17/30

    CPC分类号: G06F21/6218 G06F16/24573

    摘要: A technique including accessing data to control permissions assigned to a given role for a computer system. The data assigns the given role with a role template and an environment template, wherein the role template defines at least one action that can be performed with the system, the environment template defines at least one resource of the system that can be accessed, and the role and environment templates are independently assignable to at least one other role. The technique includes controlling access to the system based on the data.

    摘要翻译: 一种技术,包括访问数据以控制分配给计算机系统的给定角色的权限。 数据将给定的角色分配角色模板和环境模板,其中角色模板定义至少一个可以与系统一起执行的操作,环境模板定义至少一个可被访问的系统的资源, 角色和环境模板可以独立地分配给至少一个其他角色。 该技术包括基于数据控制对系统的访问。