会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Firewall installer
    • 防火墙安装程序
    • US08266685B2
    • 2012-09-11
    • US11804409
    • 2007-05-18
    • David AbzarianEran YarivEmanuel PaleologuGerardo Diaz CuellarIan Carbaugh
    • David AbzarianEran YarivEmanuel PaleologuGerardo Diaz CuellarIan Carbaugh
    • H04L29/06
    • H04L63/0263G06F8/61G06F9/44505G06F21/57H04L41/0806H04L41/082
    • Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative format that describes one or more rules to be implemented by the firewall, and that automatically configures the firewall. Providing a firewall installer that is capable of configuring a firewall based upon declarative input rather than procedural process-oriented input facilitates administration of a firewall by allowing an administrator to specify desired firewall configuration at a higher, declarative level and frees the administrator from the need to specify procedures for implementing configuration changes in the firewall. In one embodiment of the invention, the firewall installer can receive and store input for configuring a firewall even when the firewall is not running, such that the firewall executes on those configuration changes when it next comes online.
    • 本发明的实施例涉及一种防火墙安装程序,其接收一组配置指令,用于以说明性格式配置防火墙,该声明性格式描述要由防火墙实现的一个或多个规则,并且自动配置防火墙。 提供能够基于声明性输入而不是过程性过程导向输入配置防火墙的防火墙安装程序,通过允许管理员以更高的声明级别指定所需的防火墙配置,从而有助于管理防火墙,并释放管理员不需要 指定在防火墙中实现配置更改的过程。 在本发明的一个实施例中,防火墙安装者可以接收和存储用于配置防火墙的输入,即使在防火墙未运行时,防火墙安装者也可以接收和存储用于配置防火墙的输入,使得防火墙在下一次联机时对这些配置更改执行。
    • 4. 发明申请
    • Determining a merged security policy for a computer system
    • 确定计算机系统的合并安全策略
    • US20090007219A1
    • 2009-01-01
    • US11823837
    • 2007-06-28
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • G06F17/00
    • H04L63/20G06F21/577H04L63/0263
    • Embodiments of the invention described herein are directed to a mechanism for determining whether at least one operation will be effective in view of at least one security policy. In exemplary implementations, determining whether at least one operation will be effective in view of at least one security policy may comprise determining a merged security policy for a computer system by merging security policies for the computer system from two or more sources. The security policies may be security policies set by a user and/or an administrator of the computer system, may be security policies of a computer network to which the computer system is connected, or may be security policies of one or more other computer systems that are above the computer system in a computer network hierarchy.
    • 本文描述的本发明的实施例涉及用于根据至少一个安全策略来确定至少一个操作是否有效的机制。 在示例性实现中,鉴于至少一个安全策略确定至少一个操作是否有效可以包括通过从两个或更多个源合并计算机系统的安全策略来确定计算机系统的合并安全策略。 安全策略可以是由用户和/或计算机系统的管理员设置的安全策略,可以是计算机系统连接到的计算机网络的安全策略,或者可以是一个或多个其他计算机系统的安全策略, 在计算机网络层次结构中的计算机系统之上。