会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Security restrictions on binary behaviors
    • 对二进制行为的安全限制
    • US07743425B2
    • 2010-06-22
    • US10836417
    • 2004-04-29
    • Shankar GaneshJohn G. Bedworth
    • Shankar GaneshJohn G. Bedworth
    • G06F7/04G06F17/30H04L9/32H04N7/16B41K3/38
    • H04L63/105
    • A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    • 安全模型基于识别的安全区域限制机器上的二进制行为。 二进制行为可以附加到文档,网页或电子邮件的元素。 二进制行为可能威胁到本地机器上的安全性。 安全管理员拦截下载请求和/或执行请求,识别所请求的二进制行为的安全区域,并限制基于安全区域的访问。 二进制行为可以根据相关URL识别安全区域。 在一个示例中,与安全区域相关联的所有二进制行为被相同地处理。 在另一个示例中,允许的二进制行为的列表与安全区域相关联,使得仅允许指定的二进制行为被访问。 在另一个示例中,不允许的二进制行为的列表与安全区域相关联,使得在列表中找到的二进制行为不能启动访问。
    • 4. 发明授权
    • Software license authorization system
    • 软件许可授权系统
    • US07703142B1
    • 2010-04-20
    • US10840317
    • 2004-05-06
    • Patrick D. WilsonJoao C. TeixeiraKenneth V. GeorgeAdam C. Workman
    • Patrick D. WilsonJoao C. TeixeiraKenneth V. GeorgeAdam C. Workman
    • G06F7/04G06F17/30H04L9/32H04N7/16B41K3/38G06F21/00G06Q20/00
    • G06F21/105G06Q20/382H04W12/08
    • An authorization system is described that includes a first interface, a processing system, and a second interface. The first interface is configured to receive an authorization instruction from an enterprise and receive an authorization request from a user device. The authorization instructions indicate authorization parameters. The user device transfers the authorization request each time the application is selected for execution. The authorization instructions are based on a license obtained by the enterprise for an application and wherein a user device operated by a user has the application. The processing system is configured to process the authorization request and authorization parameters to determine if the execution of the application is authorized. The second interface is configured to transfer an authorized message to the user device if the execution of the application is authorized and transfer an unauthorized message to the user device if the execution of the application is not authorized.
    • 描述了包括第一接口,处理系统和第二接口的授权系统。 第一接口被配置为从企业接收授权指令并从用户设备接收授权请求。 授权说明指示授权参数。 每当应用程序被选择执行时,用户设备传送授权请求。 授权指令基于企业针对应用获得的许可证,并且其中由用户操作的用户设备具有应用。 处理系统被配置为处理授权请求和授权参数以确定应用的执行是否被授权。 第二接口被配置为如果应用的执行被授权则将授权的消息传送到用户设备,并且如果应用的执行未被授权则将未经授权的消息传送到用户设备。