会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Multi-profile interface specific network security policies
    • 多配置界面特定的网络安全策略
    • US08201234B2
    • 2012-06-12
    • US11746478
    • 2007-05-09
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • Gerardo Diaz-CuellarDavid AbzarianLokesh Srinivas KoppoluEran Yariv
    • H04L29/06
    • H04L63/20H04L63/0428H04L63/08
    • Computer-readable medium having a data structure stored thereon for defining a schema for expressing a network security policy. The data structure includes a first data field including data defining a parameter to be applied based on the network security policy. The network security policy defines at least one of the following: a firewall rule and a connection security rule. The data structure also includes a second data field having data specifying restrictions of the parameter included in the first data field. The parameter in the first data field and the restrictions in the second data field form the schema for expressing the network security policy to be processed. The network security policy manages communications between a computing device and at least one other computing device.
    • 计算机可读介质,其上存储有用于定义表示网络安全策略的模式的数据结构。 数据结构包括第一数据字段,包括基于网络安全策略定义要应用的参数的数据。 网络安全策略定义以下至少一个:防火墙规则和连接安全规则。 数据结构还包括具有指定包含在第一数据字段中的参数的限制的数据的第二数据字段。 第一数据字段中的参数和第二数据字段中的限制形成用于表示要处理的网络安全策略的模式。 网络安全策略管理计算设备与至少一个其他计算设备之间的通信。
    • 5. 发明申请
    • Remote configuration of software component using proxy
    • 使用代理远程配置软件组件
    • US20080028457A1
    • 2008-01-31
    • US11495412
    • 2006-07-28
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • G06F15/16
    • H04L63/1441H04L63/08
    • A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
    • 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。
    • 6. 发明授权
    • Firewall installer
    • 防火墙安装程序
    • US08266685B2
    • 2012-09-11
    • US11804409
    • 2007-05-18
    • David AbzarianEran YarivEmanuel PaleologuGerardo Diaz CuellarIan Carbaugh
    • David AbzarianEran YarivEmanuel PaleologuGerardo Diaz CuellarIan Carbaugh
    • H04L29/06
    • H04L63/0263G06F8/61G06F9/44505G06F21/57H04L41/0806H04L41/082
    • Embodiments of the invention are directed to a firewall installer that receives a set of configuration instructions for configuring a firewall in a declarative format that describes one or more rules to be implemented by the firewall, and that automatically configures the firewall. Providing a firewall installer that is capable of configuring a firewall based upon declarative input rather than procedural process-oriented input facilitates administration of a firewall by allowing an administrator to specify desired firewall configuration at a higher, declarative level and frees the administrator from the need to specify procedures for implementing configuration changes in the firewall. In one embodiment of the invention, the firewall installer can receive and store input for configuring a firewall even when the firewall is not running, such that the firewall executes on those configuration changes when it next comes online.
    • 本发明的实施例涉及一种防火墙安装程序,其接收一组配置指令,用于以说明性格式配置防火墙,该声明性格式描述要由防火墙实现的一个或多个规则,并且自动配置防火墙。 提供能够基于声明性输入而不是过程性过程导向输入配置防火墙的防火墙安装程序,通过允许管理员以更高的声明级别指定所需的防火墙配置,从而有助于管理防火墙,并释放管理员不需要 指定在防火墙中实现配置更改的过程。 在本发明的一个实施例中,防火墙安装者可以接收和存储用于配置防火墙的输入,即使在防火墙未运行时,防火墙安装者也可以接收和存储用于配置防火墙的输入,使得防火墙在下一次联机时对这些配置更改执行。
    • 7. 发明授权
    • Remote configuration of software component using proxy
    • 使用代理远程配置软件组件
    • US07836495B2
    • 2010-11-16
    • US11495412
    • 2006-07-28
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • Gerardo Diaz-CuellarEran YarivDavid Abzarian
    • G06F9/00
    • H04L63/1441H04L63/08
    • A proxy service receives requests from a remote caller to configure a main service. The proxy service authenticates the caller and validates the request. The proxy service then passes the request along to the main service if the caller can be authenticated and if the request can be validated. The proxy service runs at a non-privileged level, but when the proxy service passes the request to the main service, the proxy service impersonates the caller so that the request to the main service is made at the original caller's level of privilege. The main service can block all inbound network traffic, since network requests to configure the main service are received by the proxy, which is a local object from the perspective of the main service. Additionally, the proxy can block inbound traffic other than a certain class of requests (e.g., Remote Procedure Calls).
    • 代理服务从远程主叫方接收请求以配置主服务。 代理服务认证呼叫者并验证请求。 代理服务然后将请求传递到主服务,如果呼叫者可以被认证,并且请求可以被验证。 代理服务以非特权级别运行,但是当代理服务将请求传递给主服务时,代理服务模拟主叫方,使得对主服务的请求是在原始呼叫者的权限级别进行的。 主服务可以阻止所有入站网络流量,因为从主服务的角度看,代理服务器接收到配置主服务的网络请求,这是一个本地对象。 此外,代理可以阻止除特定类别的请求之外的入站流量(例如,远程过程调用)。
    • 8. 发明申请
    • Determining a merged security policy for a computer system
    • 确定计算机系统的合并安全策略
    • US20090007219A1
    • 2009-01-01
    • US11823837
    • 2007-06-28
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • David AbzarianGerardo Diaz CuellarMark VaymanEran Yariv
    • G06F17/00
    • H04L63/20G06F21/577H04L63/0263
    • Embodiments of the invention described herein are directed to a mechanism for determining whether at least one operation will be effective in view of at least one security policy. In exemplary implementations, determining whether at least one operation will be effective in view of at least one security policy may comprise determining a merged security policy for a computer system by merging security policies for the computer system from two or more sources. The security policies may be security policies set by a user and/or an administrator of the computer system, may be security policies of a computer network to which the computer system is connected, or may be security policies of one or more other computer systems that are above the computer system in a computer network hierarchy.
    • 本文描述的本发明的实施例涉及用于根据至少一个安全策略来确定至少一个操作是否有效的机制。 在示例性实现中,鉴于至少一个安全策略确定至少一个操作是否有效可以包括通过从两个或更多个源合并计算机系统的安全策略来确定计算机系统的合并安全策略。 安全策略可以是由用户和/或计算机系统的管理员设置的安全策略,可以是计算机系统连接到的计算机网络的安全策略,或者可以是一个或多个其他计算机系统的安全策略, 在计算机网络层次结构中的计算机系统之上。