会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • System and method of controlling access to information in a virtual computing environment
    • 控制虚拟计算环境中信息访问的系统和方法
    • US08510806B2
    • 2013-08-13
    • US12604170
    • 2009-10-22
    • Tobias QueckSebastian Steinhauer
    • Tobias QueckSebastian Steinhauer
    • G06F17/30
    • G06F21/6209
    • In one embodiment the present invention includes a computer-implemented method comprising storing authorization data on a first client computer system, accessing virtual computing software from the first client computer system, accessing a virtual object in the virtual computing software in response to instructions received from the first client computer system, sending the authorization data from the first client computer system to a second computer system, wherein the authorization data specifies access rights on the second computer system, and accessing the second computer system using the authorization data and determining access rights on the second computer system based on said authorization data.
    • 在一个实施例中,本发明包括计算机实现的方法,包括在第一客户端计算机系统上存储授权数据,从第一客户端计算机系统访问虚拟计算软件,响应于从所述虚拟计算机系统接收的指令,访问虚拟计算软件中的虚拟对象 第一客户端计算机系统,将授权数据从第一客户端计算机系统发送到第二计算机系统,其中授权数据指定第二计算机系统上的访问权限,以及使用授权数据访问第二计算机系统,并且确定访问权限 基于所述授权数据的第二计算机系统。
    • 6. 发明申请
    • System and Method of Controlling Access to Information in a Virtual Computing Environment
    • 控制虚拟计算环境中信息访问的系统和方法
    • US20110099608A1
    • 2011-04-28
    • US12604170
    • 2009-10-22
    • Tobias QueckSebastian Steinhauer
    • Tobias QueckSebastian Steinhauer
    • G06F21/00H04L9/00G06F9/455
    • G06F21/6209
    • In one embodiment the present invention includes a computer-implemented method comprising storing authorization data on a first client computer system, accessing virtual computing software from the first client computer system, accessing a virtual object in the virtual computing software in response to instructions received from the first client computer system, sending the authorization data from the first client computer system to a second computer system, wherein the authorization data specifies access rights on the second computer system, and accessing the second computer system using the authorization data and determining access rights on the second computer system based on said authorization data.
    • 在一个实施例中,本发明包括计算机实现的方法,包括在第一客户端计算机系统上存储授权数据,从第一客户端计算机系统访问虚拟计算软件,响应于从所述虚拟计算机系统接收的指令,访问虚拟计算软件中的虚拟对象 第一客户端计算机系统,将授权数据从第一客户端计算机系统发送到第二计算机系统,其中授权数据指定第二计算机系统上的访问权限,以及使用授权数据访问第二计算机系统,并且确定访问权限 基于所述授权数据的第二计算机系统。
    • 7. 发明授权
    • Rest interface interaction with expectation management
    • 休息界面与期望管理的互动
    • US08775555B2
    • 2014-07-08
    • US13106878
    • 2011-05-13
    • Sebastian Steinhauer
    • Sebastian Steinhauer
    • G06F15/16H04L29/06
    • H04L69/22
    • Various embodiments of systems and methods for REST interface interaction with expectation management are described herein. A message request is received for accessing content of a resource. Further, a check is made to determine whether the message request includes a structure-expected in a header of the message request. Also, a check is made to determine whether the structure-expected matches with a structure of the resource if the message request includes the structure-expected. Furthermore, the message request is executed if the structure-expected matches with the resource structure. Then, a message response is returned with a structure-resulted in a header of the message response based on the execution of the message request. If the message request does not include the structure-expected, the message request is executed and the message response is returned with the structure-resulted based on the execution of the message request.
    • 这里描述了用于与期望管理的REST接口交互的系统和方法的各种实施例。 接收到用于访问资源的内容的消息请求。 此外,进行检查以确定消息请求是否包括期望在消息请求的报头中的结构。 此外,如果消息请求包括期望结构,则进行检查以确定结构期望与资源的结构匹配。 此外,如果结构预期与资源结构匹配,则执行消息请求。 然后,基于消息请求的执行,返回消息响应,结构导致消息响应的报头。 如果消息请求不包括期望的结构,则执行消息请求,并且基于消息请求的执行,返回结果导致的消息响应。
    • 9. 发明授权
    • System and method of controlling access to information in a virtual computing environment
    • 控制虚拟计算环境中信息访问的系统和方法
    • US08280966B2
    • 2012-10-02
    • US12604137
    • 2009-10-22
    • Sebastian Steinhauer
    • Sebastian Steinhauer
    • G06F15/16G06F15/173G06F9/455
    • G06F21/6209G06F9/468
    • In one embodiment the present invention includes a method comprising specifying personal spaces in the virtual computing environment for first and second users and moving the personal spaces to encompass a virtual object, where the virtual object is associated with data on another system. A message is sent from a virtual server to one of the user's clients to access the data associated with the virtual object from the other system. Credentials necessary for accessing the data are stored on different user's clients, and the credentials are used to authenticate the user and perform the data access. The data associated with the virtual object may then be sent to the other user.
    • 在一个实施例中,本发明包括一种方法,包括在第一和第二用户的虚拟计算环境中指定个人空间,并移动个人空间以包含虚拟对象,虚拟对象与另一系统上的数据相关联。 将消息从虚拟服务器发送到用户的客户端之一以从其他系统访问与虚拟对象相关联的数据。 访问数据所需的证书存储在不同用户的客户端上,凭证用于验证用户并执行数据访问。 然后可以将与虚拟对象相关联的数据发送给其他用户。