Policy management for host name mapped to dynamically assigned network address

    公开(公告)号:GB2356763A

    公开(公告)日:2001-05-30

    申请号:GB0018985

    申请日:2000-08-02

    Abstract: Method and apparatus for assigning policies which are rules that govern the use of or access to network services. Each rule defines conditions that when evaluated true trigger actions to allow or deny the service. Techniques are disclosed which provide for explicit, flexible, and centralized assignment of policy to targets which are specified network services. These techniques include explicitly associating a policy with a network resource or process, grouping policy related processes, grouping related targets, associating groups of targets with groups of policies, mapping a user name contained in a policy to an associated network address such as an Internet Protocol (IP) address, and providing dynamically mapped policy identified user and host names with associated network addresses, such as IP addresses, to client processes.

    Explicit targeting of management policies

    公开(公告)号:GB2356316A

    公开(公告)日:2001-05-16

    申请号:GB0018983

    申请日:2000-08-02

    Abstract: Method and apparatus for assigning policies [210] which are rules [210] that govern the use of or access to network [120] services. Each rule [210] defines conditions that when evaluated true trigger actions to allow or deny the service. Techniques are disclosed which provide for explicit, flexible, and centralized assignment of policy [210] to targets [110] which are specified network [120] services. These techniques include explicitly associating a policy [210] with a network [120] resource or process, grouping policy [210] related processes, grouping related targets [110] , associating groups of targets [300] not shown with groups of policies [400] not shown, mapping a user name [980] not shown contained in a policy [210] to an associated network address [690] such as an Internet Protocol (IP) address [690] , and providing dynamically mapped policy identified user and host names [980,680] not shown with associated network addresses [690] , such as IP addresses [690] , to client processes [660] .

    TURING TEST BASED USER AUTHENTICATION AND USER PRESENCE VERIFICATION SYSTEM, DEVICE, AND METHOD
    39.
    发明公开
    TURING TEST BASED USER AUTHENTICATION AND USER PRESENCE VERIFICATION SYSTEM, DEVICE, AND METHOD 审中-公开
    系统,设备,以及有关VERFAHRENAUF基于图灵测试的用户认证和用户在场回顾

    公开(公告)号:EP2798577A4

    公开(公告)日:2016-09-28

    申请号:EP11878347

    申请日:2011-12-27

    Applicant: INTEL CORP

    CPC classification number: G06F21/32 G06K9/00288 G06K9/00899

    Abstract: A password-less method for authenticating a user includes capturing one or more images of a face of the user and comparing the one or more images with a previously collected face template. Randomly selected colored light and randomized blinking patterns are used to capture the images of the user. Such captured images are compared to previously collected face templates, thereby thwarting spoof attacks. A secret image, known only to the user and the device, is moved from one area of the display to another randomly selected area, using the movements of the user's head or face, thereby providing a Turing based challenge. Protected audio video path (PAVP) enabled devices and components are used to protect the challenge from malware attacks.

    Abstract translation: 用于认证用户的密码更少方法包括捕获用户面部的中的一个或多个图像和所述一个或多个图像与以前收集到的脸部模板进行比较。 随机选择的色光和随机化的闪烁模式用于捕捉用户的图像。 搜索捕捉到的图像对比于之前收集到的脸部模板,从而挫败欺骗攻击。 秘密图像,只知道用户和设备中,从显示器的一个区域移动到另一个随机选择的区域中,使用用户的头部或脸部的运动,从而提供一个基于图灵挑战。 受保护的音频视频路径(PAVP)的设备和部件被用于防止恶意软件攻击的挑战。

    INCREASING VIRTUAL-MEMORY EFFICIENCIES
    40.
    发明公开
    INCREASING VIRTUAL-MEMORY EFFICIENCIES 审中-公开
    增加虚拟内存的效率

    公开(公告)号:EP2801025A4

    公开(公告)日:2015-08-26

    申请号:EP12864336

    申请日:2012-01-04

    Applicant: INTEL CORP

    Abstract: Embodiments of techniques and systems for increasing efficiencies in computing systems using virtual memory are described. In embodiments, instructions which are located in two memory pages in a virtual memory system, such that one of the pages does not permit execution of the instructions located therein, are identified and then executed under temporary permissions that permit execution of the identified instructions. In various embodiments, the temporary permissions may come from modified virtual memory page tables, temporary virtual memory page tables which allow for execution, and/or emulators which have root access. In embodiments, per-core virtual memory page tables may be provided to allow two cores of a computer processor to operate in accordance with different memory access permissions. In embodiments, a physical page permission table may be utilized to provide for maintenance and tracking of per-physical-page memory access permissions. Other embodiments may be described and claimed.

Patent Agency Ranking