会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明申请
    • Computing Resource Inventory System
    • 计算资源库存系统
    • US20160188369A1
    • 2016-06-30
    • US15064891
    • 2016-03-09
    • Bank of America Corporation
    • Armen MoloianRonald W. Ritchey
    • G06F9/50
    • G06F9/50G06F11/3051G06F11/3466G06F17/30592H04L43/06
    • Systems and methods of managing computing resources of a computing system are described. A computing resource list and computing resource information may be stored at a data store. The computing resource list may identify a set of computing resources of a computing system, and the computing resource information may respectively describe the computing resources. The computing resource list may be updated in response to a new computing resource being added to the computing system or in response to an existing computing resource being removed from the computing system. Evaluation tasks for the computing resources may be performed, and a resource evaluation report may be generated during performance of at least one of the evaluation reports.
    • 描述了管理计算系统的计算资源的系统和方法。 计算资源列表和计算资源信息可以存储在数据存储器中。 计算资源列表可以标识计算系统的一组计算资源,并且计算资源信息可以分别描述计算资源。 计算资源列表可以响应于添加到计算系统的新计算资源或响应于从计算系统移除的现有计算资源而被更新。 可以执行计算资源的评估任务,并且可以在执行至少一个评估报告期间生成资源评估报告。
    • 15. 发明申请
    • Authenticating Users Requesting Access to Computing Resources
    • 认证用户请求访问计算资源
    • US20160171196A1
    • 2016-06-16
    • US15048283
    • 2016-02-19
    • Bank of America Corporation
    • Armen MoloianJohn H. Kling
    • G06F21/31H04L29/06
    • G06F21/31G06F21/40G06F21/62G06F21/6218H04L63/083H04L63/101H04L63/102H04L63/108H04L63/1425
    • Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on actions available to be performed at the computing resources. An authenticator may verify login credentials received from a user and authorize the user to access a computing resource. A request to perform an action at the computing resource may be received, and a usage monitor may apply a usage rule to the requested action. If the requested action violates the usage constraint of the usage rule, the usage monitor may halt performance of the requested action and notify another user of the usage constraint violation. The authenticator may receive and verify another set of login credentials from that other user. In response to successful verification of the additional set of login credentials, the usage monitor may resume performance of the requested action.
    • 提供了系统和方法来监视计算资源的访问。 可以创建和存储使用规则,其基于可在计算资源上执行的动作来定义使用约束。 验证者可以验证从用户接收的登录凭证,并授权用户访问计算资源。 可以接收在计算资源执行动作的请求,并且使用监视器可以将所述使用规则应用于所请求的动作。 如果所请求的操作违反了使用规则的使用约束,则使用监视器可以停止所请求动作的执行并通知另一个用户使用约束违规。 验证者可以从该另一个用户接收并验证另一组登录凭证。 响应成功验证额外的一组登录凭证,使用监视器可以恢复所请求动作的执行。
    • 16. 发明授权
    • Continuous monitoring of access of computing resources
    • 持续监控计算资源的访问
    • US09298899B1
    • 2016-03-29
    • US14483589
    • 2014-09-11
    • Bank of America Corporation
    • Armen MoloianJohn H. Kling
    • G06F21/62G06F21/31H04L29/06
    • G06F21/31G06F21/40G06F21/62G06F21/6218H04L63/083H04L63/101H04L63/102H04L63/108H04L63/1425
    • Systems and methods are provided for monitoring access of computing resources. Usage rules may be created and stored that define a usage constraint based on actions available to be performed at the computing resources. An authenticator may verify login credentials received from a user and authorize the user to access a computing resource. A request to perform an action at the computing resource may be received, and a usage monitor may apply a usage rule to the requested action. If the requested action violates the usage constraint of the usage rule, the usage monitor may halt performance of the requested action and notify another user of the usage constraint violation. The authenticator may receive and verify another set of login credentials from that other user. In response to successful verification of the additional set of login credentials, the usage monitor may resume performance of the requested action.
    • 提供了系统和方法来监视计算资源的访问。 可以创建和存储使用规则,其基于可在计算资源上执行的动作来定义使用约束。 验证者可以验证从用户接收的登录凭证,并授权用户访问计算资源。 可以接收在计算资源执行动作的请求,并且使用监视器可以将所述使用规则应用于所请求的动作。 如果所请求的操作违反了使用规则的使用约束,则使用监视器可以停止所请求动作的执行并通知另一个用户使用约束违规。 验证者可以从该另一个用户接收并验证另一组登录凭证。 响应成功验证额外的一组登录凭证,使用监视器可以恢复所请求动作的执行。
    • 17. 发明申请
    • MATRIX ACCESS REVIEW
    • MATRIX访问审查
    • US20160080224A1
    • 2016-03-17
    • US14486066
    • 2014-09-15
    • Bank of America Corporation
    • Igor A. BaikalovArmen MoloianDavid Pritchard
    • H04L12/26H04W4/08
    • H04W4/08
    • A computing platform may receive, from a plurality of computing systems, data identifying permissions of a plurality of users to access one or more resources of the plurality of computing systems. The computing platform may identify, from amongst the plurality of users, a plurality of groups of users. The computing platform may identify, from amongst the permissions, a plurality of sets of permissions. Each set of permissions may include permissions shared by each user of a group of users of the plurality of groups of users. The computing platform may generate a graphical depiction of the plurality of groups of users and the plurality of sets of permissions. The graphical depiction may graphically depict, for each group of the plurality of groups, one or more sets of permissions, of the plurality of sets of permissions, shared by each user of the group.
    • 计算平台可以从多个计算系统接收识别多个用户访问多个计算系统中的一个或多个资源的许可的数据。 计算平台可以从多个用户中识别多个用户组。 计算平台可以从权限中识别多个权限集合。 每组权限可以包括多个用户组中的一组用户的每个用户共享的许可。 计算平台可以生成多个用户组和多组权限的图形描绘。 图形描绘可以图形地描绘对于该组的每个用户共享的多组权限集中的每组多组中的一组或多组。
    • 18. 发明申请
    • FACILITATING REVIEW OF ACCESS RIGHTS IN A COMPUTING SYSTEM
    • 促进对计算机系统的访问权的审查
    • US20140289846A1
    • 2014-09-25
    • US14267571
    • 2014-05-01
    • Bank of America Corporation
    • Armen MoloianRonald W. Ritchey
    • G06F21/36
    • G06F21/604
    • Systems and methods for facilitating reviews of IAM information are described. A list of pending reviews of respective access rights of a computing system may be provided to a display device for presentation at a display interface. A review decision for one of the pending reviews may be received such that the pending review becomes a completed review. The review decision and a date the review decision was received may be stored at a data store. An access right associated with the completed review may be selected in response to a review event that requires review of that access right. It may then be determined whether the completed review is accreditable to review of the access right selected for the review event based on the date the review decision was received for the completed review.
    • 描述了便于对IAM信息进行审查的系统和方法。 可以向显示设备提供计算系统的相应访问权限的待审查列表,以在显示界面处呈现。 可能会收到其中一个未决审查的审查决定,以便待审核审查成为完整的审查。 审查决定和收到审查决定的日期可以存储在数据存储中。 可以选择与完成的审查相关联的访问权限,以响应需要审核该访问权限的审核事件。 然后可以根据收到完成审查的审查决定的日期,确定完成的审核是否可以被认可审查选定的审查事件的访问权限。
    • 19. 发明申请
    • COMPUTING RESOURCE INVENTORY SYSTEM
    • 计算资源库存系统
    • US20140289402A1
    • 2014-09-25
    • US14267586
    • 2014-05-01
    • Bank of America Corporation
    • Armen MoloianRonald W. Ritchey
    • G06F11/30H04L12/26
    • G06F9/50G06F11/3051G06F11/3466G06F17/30592H04L43/06
    • Systems and methods of managing computing resources of a computing system are described. A computing resource list and computing resource information may be stored at a data store. The computing resource list may identify a set of computing resources of a computing system, and the computing resource information may respectively describe the computing resources. The computing resource list may be updated in response to a new computing resource being added to the computing system or in response to an existing computing resource being removed from the computing system. Evaluation tasks for the computing resources may be performed, and a resource evaluation report may be generated during performance of at least one of the evaluation reports.
    • 描述了管理计算系统的计算资源的系统和方法。 计算资源列表和计算资源信息可以存储在数据存储器中。 计算资源列表可以标识计算系统的一组计算资源,并且计算资源信息可以分别描述计算资源。 计算资源列表可以响应于添加到计算系统的新计算资源或响应于从计算系统移除的现有计算资源而被更新。 可以执行计算资源的评估任务,并且可以在执行至少一个评估报告期间生成资源评估报告。