会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Multi-profile interface specific network security policies
    • 多配置界面特定的网络安全策略
    • US08201234B2
    • 2012-06-12
    • US11746478
    • 2007-05-09
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • H04L29/06
    • H04L63/20H04L63/0428H04L63/08
    • Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
    • 计算机可读介质,其上存储有用于定义表示网络安全策略的模式的数据结构。 数据结构包括第一数据字段,包括基于网络安全策略定义要应用的参数的数据。 网络安全策略定义以下至少一个:防火墙规则和连接安全规则。 数据结构还包括具有指定包含在第一数据字段中的参数的限制的数据的第二数据字段。 第一数据字段中的参数和第二数据字段中的限制形成用于表示要处理的网络安全策略的模式。 网络安全策略管理计算设备与至少一个其他计算设备之间的通信。
    • 6. 发明申请
    • Remote configuration of software component using proxy
    • 使用代理远程配置软件组件
    • US20080028457A1
    • 2008-01-31
    • US11495412
    • 2006-07-28
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • G06F15/16
    • H04L63/1441H04L63/08
    • A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
    • 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。