会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Utilizing signatures to discover and manage derelict assets of an information technology environment
    • 利用签名来发现和管理信息技术环境的遗弃资产
    • US08527628B2
    • 2013-09-03
    • US13112197
    • 2011-05-20
    • Romelia H. FloresJoseph E. HackettLeonard S. Hand
    • Romelia H. FloresJoseph E. HackettLeonard S. Hand
    • G06F15/173
    • G06F9/4401G06F9/5061H04L63/1416H04L63/1433
    • A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets.
    • 可以分析一组资产签名。 每个资产签名都可以与资产相关联。 可以根据资产签名发现资产。 资产可以代表信息技术(IT)环境的基本结构单元。 可以进行多阶段筛选过程以发现遗弃资产。 在第一阶段,具有正常状态的资产能够根据分析相应资产签名的结果而变为可疑状态。 在第二阶段,具有可疑状态的资产能够被选择性地改变到正常状态或者废除状态。 可以为每组资产维护资产管理系统记录。 资产管理系统的每个记录可以是配置项(CI),其指示该组资产是否处于正常状态,可疑状态或废弃状态。 资产管理系统可以定期回收遗失资产所消耗的资源。
    • 10. 发明授权
    • Identifying stray assets in a computing enviroment and responsively taking resolution actions
    • 识别计算环境中的流浪资产,并对其采取行动
    • US08775607B2
    • 2014-07-08
    • US12964894
    • 2010-12-10
    • Gary L. DetroJoe HackettLeonard S. HandAdam A. Nemati
    • Gary L. DetroJoe HackettLeonard S. HandAdam A. Nemati
    • G06F15/173
    • H04L41/0853G06F11/3006G06F11/3051H04L41/0866
    • In a discovery stage, a set of suspect rules can be utilized to determine if each environment asset of the computing environment is to be considered a suspect asset or a standard environment asset, where suspect assets are a subset of environment assets of the computing environment. In a confirmation stage, a set of stray rules can be used to determine whether each suspect asset is to be considered a stray asset, wherein stray assets are a subset of the suspect assets. A stray asset can be an asset defined and configured by a configuration management system that is active in the computing environment and is consuming resources of the computing environment yet is not needed by active processes of the computing environment and is unneeded by other active environment assets. For each stray asset, at least one resolution action (e.g., alert action, containment action, delete action) can be performed.
    • 在发现阶段,可以使用一组可疑规则来确定计算环境的每个环境资产是否被视为可疑资产或标准环境资产,其中可疑资产是计算环境的环境资产的子集。 在确认阶段,可以使用一组流浪规则来确定每个疑犯资产是否被视为流动资产,其中流浪资产是可疑资产的子集。 杂散资产可以是由在计算环境中活跃并且消耗计算环境的资源而不是计算环境的活动进程所需的配置管理系统所定义和配置的资产,并且不被其他活动环境资产所用。 对于每个流浪资产,可以执行至少一个解决动作(例如,警报动作,收容动作,删除动作)。