会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Trusted database authentication through an untrusted intermediary
    • 通过不受信任的中间人进行受信任的数据库认证
    • US08555351B2
    • 2013-10-08
    • US12240102
    • 2008-09-29
    • Neil I. ReadshawIvan M. Milman
    • Neil I. ReadshawIvan M. Milman
    • H04L9/32G06F15/16
    • H04L9/3271H04L9/321
    • A method, system and computer-usable medium are disclosed for validating user credentials submitted to a data source by an untrusted intermediary. An untrusted intermediary attempts to access a data source on behalf of a user. The untrusted intermediary challenges the user to provide credentials of the type and format required to access the data provided by the data source. The user's trust client connects to an authentication service and identification credentials of the required type and format are generated. The identification credentials are conveyed to the user's trust client, which then provides them to the user's client, which in turn conveys them to the untrusted intermediary. The untrusted intermediary then presents the identification credentials to an authentication plug-in of the data source. The authentication plug-in validates the authenticity of the provided credentials with their associated authentication service. Once the credentials are successfully validated, the requested data is provided to the user's client by the untrusted intermediary.
    • 公开了一种方法,系统和计算机可用介质,用于验证由不信任的中间人提交给数据源的用户凭证。 不信任的中间人试图代表用户访问数据源。 不信任的中间人挑战用户提供访问数据源提供的数据所需的类型和格式的凭据。 用户的信任客户端连接到认证服务,并生成所需类型和格式的身份凭证。 识别凭证被传达给用户的信任客户端,该客户端然后将它们提供给用户的客户端,从而将它们传递给不信任的中介。 然后,不信任的中间人将识别凭证呈现给数据源的认证插件。 验证插件验证提供的凭据与其相关联的身份验证服务的真实性。 一旦证书成功验证,请求的数据由不受信任的中间人提供给用户的客户端。
    • 4. 发明申请
    • Auto-Mapping Between Source and Target Models Using Statistical and Ontology Techniques
    • 源和目标模型之间的自动映射使用统计和本体技术
    • US20130031117A1
    • 2013-01-31
    • US13190766
    • 2011-07-26
    • Dan J. MandelsteinIvan M. MilmanMartin A. OberhoferSushain Pandit
    • Dan J. MandelsteinIvan M. MilmanMartin A. OberhoferSushain Pandit
    • G06F17/30
    • G06F17/303G06F17/30914
    • A system maps data within a data source to a target data model, and comprises a computer system including at least one processor. The system determines an identifier for each data object of the data source based on the data within that data object, wherein the identifier indicates for that data object a corresponding concept within a domain ontological representation of a data model of the data source. The determined identifiers for the data objects of the data source are compared to the target data model to determine mappings between the data objects of the data source and the target data model. Data objects from the data source are extracted for the target data model in accordance with the mappings. Present invention embodiments further include a method and computer program product for mapping data within a data source to a target data model.
    • 系统将数据源中的数据映射到目标数据模型,并且包括包括至少一个处理器的计算机系统。 该系统基于该数据对象内的数据确定数据源的每个数据对象的标识符,其中该标识符为该数据对象指示数据源的数据模型的域本体表示内的对应概念。 将确定的数据源的数据对象的标识符与目标数据模型进行比较,以确定数据源的数据对象与目标数据模型之间的映射。 根据映射提取目标数据模型的数据源数据对象。 本发明实施例还包括用于将数据源内的数据映射到目标数据模型的方法和计算机程序产品。
    • 5. 发明申请
    • SYSTEM AND METHOD FOR EVALUATING SOFTWARE SUSTAINABILITY
    • 用于评估软件可持续性的系统和方法
    • US20090138843A1
    • 2009-05-28
    • US11944984
    • 2007-11-26
    • Heather M. HintonIvan M. Milman
    • Heather M. HintonIvan M. Milman
    • G06F9/44
    • G06F8/74
    • A system and method for evaluating software sustainability are provided. The illustrative embodiments provide code scanning tools for identifying authors of portions of a software product and various attributes about the development, maintenance, and improvement of portions of the software product over time. This information may be correlated with organizational information to identify portions of the software product that may be lacking in sustainability by the persons currently associated with the software organization. Moreover, this information may be used to obtain information regarding the relative quality of the composition or conception of portions of the software product, portions of the software product that have required a relatively larger amount of resources to develop over time, a relative indication of which portions of the software product are “harder” or “easier” to sustain and who is associated with those portions of the software product, and the like.
    • 提供了一种用于评估软件可持续性的系统和方法。 说明性实施例提供用于识别软件产品的部分的作者的代码扫描工具以及关于随时间推移的软件产品的开发,维护和改进的各种属性。 该信息可以与组织信息相关联,以识别当前与软件组织相关联的人员可能缺乏可持续性的软件产品的部分。 此外,该信息可以用于获得关于软件产品的组成或概念的相对质量的信息,软件产品的部分需要相对较大量的资源以随着时间而发展,相关指示 软件产品的一部分“更难”或“更容易”维持,并且与软件产品的那些部分相关联。
    • 6. 发明申请
    • Method and system for Synchronized Policy Control In A Web Services Environment
    • Web服务环境中同步策略控制的方法和系统
    • US20080098453A1
    • 2008-04-24
    • US11550822
    • 2006-10-19
    • Heather M. HintonIvan M. Milman
    • Heather M. HintonIvan M. Milman
    • H04L9/00H04L9/32G06F17/00G06K9/00H04K1/00G06F17/30G06F7/04
    • H04L63/20H04L63/101
    • Policy controls for Web service resource objects in a hierarchical resource space are loosely coupled so that policy changes are applied and enforced across the objects. This technique ensures that different policies are not applied unintentionally to the same resource (for example, one at the Web services entry level, and the other at the resource level). By synchronizing the object in the manner described, neither the entity that deploys the application nor the security administrator need to be aware of the differences between the various types of requests that occur within a Web services environment. In a representative embodiment, resource objects are linked within a hierarchical resource space to provide synchronized policy control, where the policy is an audit policy, a quality-of-service (QoS) policy, a service level agreement (SLA) policy, a governance policy, a compliance policy, a patch management/vulnerability management policy, a user management policy, or a rights management policy.
    • 分层资源空间中的Web服务资源对象的策略控制松散耦合,以便跨对象应用和实施策略更改。 这种技术可以确保不同意的策略不会无意地应用于同一资源(例如,一个在Web服务入口级别,另一个在资源级)。 通过以所描述的方式同步对象,部署应用程序的实体和安全管理员都不需要了解在Web服务环境中发生的各种类型的请求之间的差异。 在代表性的实施例中,资源对象在分层资源空间内链接以提供同步的策略控制,其中策略是审计策略,服务质量(QoS)策略,服务水平协议(SLA)策略,治理 策略,合规策略,补丁管理/漏洞管理策略,用户管理策略或权限管理策略。