会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • System, method, and software for enforcing access control policy rules on utility computing virtualization in cloud computing systems
    • 用于实施云计算系统中实用程序计算虚拟化的访问控制策略规则的系统,方法和软件
    • US08490150B2
    • 2013-07-16
    • US12565318
    • 2009-09-23
    • Ethan HadarNimrod VaxAmir JerbiMichael Kletskin
    • Ethan HadarNimrod VaxAmir JerbiMichael Kletskin
    • G06F17/00H04L29/06
    • H04L63/20G06F9/45558G06F21/6218G06F2009/45587
    • According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    • 根据一个实施例,系统包括耦合到存储器和执行逻辑的一个或多个处理器。 策略生命周期组件配置为维护安全策略的存储库。 安全策略的存储库包括管理对虚拟主机和虚拟主机上运行的多个虚拟机的访问的策略。 策略生命周期组件还被配置为为在虚拟主机上运行的标识的虚拟操作系统发出复合策略。 复合策略为虚拟主机上运行的多个虚拟机中的每一个提供虚拟主机策略和访问规则。 拓扑管理器被配置为从策略生命周期组件接收复合策略,将化合物分配给访问控制代理,并维护安全策略拓扑。 安全策略拓扑存储访问控制代理和复合策略之间的关联。
    • 4. 发明申请
    • Information Technology Services E-Commerce Arena for Cloud Computing Environments
    • 信息技术服务云计算环境的电子商务竞技场
    • US20110208606A1
    • 2011-08-25
    • US12708879
    • 2010-02-19
    • Ethan HadarAjei Gopal
    • Ethan HadarAjei Gopal
    • G06Q30/00G06Q10/00G06Q50/00
    • G06Q30/08G06Q30/0222G06Q30/0605
    • A system and method for IT services e-commerce arena for cloud computing environments is disclosed. The method includes receiving, from each of a plurality of service clients, a request for processing time on a processor. The method also includes receiving, from each of a plurality of service providers, an offer for processing time on a processor operated by each respective service provider. Additionally, the method includes generating a buyer group based on information included in each respective request, wherein the buyer group comprises a selected one or more of the plurality of service clients to receive processing time on a processing resource and selecting one of the plurality of service providers to provide processing time on the processor operated by the selected service provider to the service clients in the buyer group. Further, the method includes initiating a transaction between each of the service clients in the buyer group and the selected service provider.
    • 公开了一种用于云计算环境的IT服务电子商务领域的系统和方法。 该方法包括从多个服务客户端中的每一个接收在处理器上处理时间的请求。 该方法还包括从多个服务提供商中的每一个接收在由每个相应服务提供商操作的处理器上处理时间的报价。 另外,该方法包括基于包括在每个相应请求中的信息来生成买方组,其中买方组包括多个服务客户端中选择的一个或多个服务客户端,以在处理资源上接收处理时间,并且选择多个服务中的一个 供应商在由所选择的服务提供商操作的处理器上向买方组中的服务客户端提供处理时间。 此外,该方法包括在买方组中的每个服务客户端和所选服务提供商之间启动交易。
    • 5. 发明申请
    • System, Method, and Software for Enforcing Access Control Policy Rules on Utility Computing Virtualization in Cloud Computing Systems
    • 系统,方法和软件,用于实施云计算系统中实用计算虚拟化的访问控制策略规则
    • US20110072486A1
    • 2011-03-24
    • US12565318
    • 2009-09-23
    • Ethan HadarNimrod VaxAmir JerbiMichael Kletskin
    • Ethan HadarNimrod VaxAmir JerbiMichael Kletskin
    • G06F21/00G06F9/455
    • H04L63/20G06F9/45558G06F21/6218G06F2009/45587
    • According to one embodiment, a system comprises one or more processors coupled to a memory and executing logic. A policy life cycle component is configured to maintain a repository of security policies. The repository of security policies comprises policies governing access to a virtual host and to a plurality of virtual machines running on the virtual host. The policy life cycle component is also configured to issue a compound policy for an identified virtual operating system running on the virtual host. The compound policy provides a virtual host policy and access rules for each of the plurality of virtual machines running on the virtual host. A topology manager is configured to receive the compound policy from the policy life cycle component, assign the compound to an access control agent, and maintain a security policy topology. The security policy topology stores associations between access control agents and compound policies.
    • 根据一个实施例,系统包括耦合到存储器和执行逻辑的一个或多个处理器。 策略生命周期组件配置为维护安全策略的存储库。 安全策略的存储库包括管理对虚拟主机和虚拟主机上运行的多个虚拟机的访问的策略。 策略生命周期组件还被配置为为在虚拟主机上运行的标识的虚拟操作系统发出复合策略。 复合策略为虚拟主机上运行的多个虚拟机中的每一个提供虚拟主机策略和访问规则。 拓扑管理器被配置为从策略生命周期组件接收复合策略,将化合物分配给访问控制代理,并维护安全策略拓扑。 安全策略拓扑存储访问控制代理和复合策略之间的关联。
    • 6. 发明申请
    • Hybrid Software Component and Service Catalog
    • 混合软件组件和服务目录
    • US20110231229A1
    • 2011-09-22
    • US12728616
    • 2010-03-22
    • Ethan Hadar
    • Ethan Hadar
    • G06Q10/00
    • G06Q10/06G06Q10/0639
    • A hybrid software component and service catalog is disclosed. A method according to embodiments of the present disclosure includes identifying a plurality of existing information technology services in an enterprise, wherein each of the plurality of existing information technology services includes a plurality of attributes. The method also includes assigning a quality metric associated with one or more attributes of each of the respective identified existing information technology services. The method also includes identifying a plurality of potential information technology services, wherein each of the plurality of potential information technology services includes a plurality of attributes. Additionally, the method includes receiving a quality metric associated with one or more attributes of each of the respective identified potential information technology services from a source external to the enterprise. The method further includes determining a threshold associated with a selected one of the existing information technology services and comparing the quality metric associated with the selected one of the existing information technology services to the quality metric associated with a selected one of the potential information technology services. The method also includes based at least in part on the comparison and the determined threshold, displaying the potential information technology resource to a user.
    • 公开了一种混合软件组件和服务目录。 根据本公开实施例的方法包括识别企业中的多个现有信息技术服务,其中多个现有信息技术服务中的每一个包括多个属性。 该方法还包括分配与各个已识别的现有信息技术服务中的每一个的一个或多个属性相关联的质量度量。 该方法还包括识别多个潜在信息技术服务,其中多个潜在信息技术服务中的每一个包括多个属性。 此外,该方法包括从企业外部的源接收与相应的所识别的潜在信息技术服务中的每一个的一个或多个属性相关联的质量度量。 该方法还包括确定与所选择的现有信息技术服务中的一个相关联的阈值,并将与所选择的一个现有信息技术服务相关联的质量度量与与所选潜在信息技术服务中的一个相关联的质量度量进行比较。 该方法还包括至少部分地基于比较和确定的阈值,向用户显示潜在的信息技术资源。
    • 9. 发明申请
    • Cloud Broker and Procurement System and Method
    • 云经纪和采购系统与方法
    • US20110213712A1
    • 2011-09-01
    • US12713557
    • 2010-02-26
    • Ethan HadarGregory Lewis BodineBalakrishna Venkatrao
    • Ethan HadarGregory Lewis BodineBalakrishna Venkatrao
    • G06Q10/00G06F15/16G06Q30/00
    • G06Q30/08G06Q30/04G06Q50/188H04L41/5009
    • A cloud broker and procurement system and method is closed. In particular embodiments, the method includes receiving an offer of a computing resource from each of a plurality of providers. The method further includes receiving, from each of the plurality of providers, a service level agreement associated with each respective offered computing resource. Additionally, the method includes normalizing each of the service level agreements associated with the offered computing resources. The method further includes receiving a request from a requesting computer for a computing resource and selecting, based at least in part on the normalized service level agreements, one of the providers to provide the requested computing resource. The method also includes transmitting a service match indicator to the client, wherein the service match indicator indicates a time at which the offered computing resource will be utilized, and utilizing the computing resource on the selected provider.
    • 一个云代理和采购系统和方法被关闭。 在特定实施例中,该方法包括从多个提供者中的每一个接收计算资源的提议。 该方法还包括从多个提供商中的每一个接收与每个相应的提供的计算资源相关联的服务级别协议。 另外,该方法包括对与所提供的计算资源相关联的每个服务级别协议进行归一化。 该方法还包括从请求计算机接收计算资源的请求,并且至少部分地基于归一化的服务水平协议来选择提供所请求的计算资源的提供者之一。 该方法还包括向客户端发送服务匹配指示符,其中服务匹配指示符指示所提供的计算资源将被利用的时间,以及利用所选择的提供者上的计算资源。