Method for providing guaranteed distributed failure notification
    1.
    发明专利
    Method for providing guaranteed distributed failure notification 有权
    提供有保障的分布式故障通知的方法

    公开(公告)号:JP2005124171A

    公开(公告)日:2005-05-12

    申请号:JP2004272462

    申请日:2004-09-17

    Abstract: PROBLEM TO BE SOLVED: To provide a method for providing a guaranteed distributed failure notification. SOLUTION: A failure notification (FN) function allows applications using the function to create an FN group to which the application associates an application state. The application registers a failure handler in the FN function on a node in the FN group and each failure handler is associated with a specific FN group. When the FN function learns of a failure in the FN group on a given node, this function executes an associated failure handler on the node. The system failure detected by the application is signaled to other FN group members using this function. This function detects a system failure that occurs in an overlay network on which this function is implemented, and signals the failure notification to the other FN group members. COPYRIGHT: (C)2005,JPO&NCIPI

    Abstract translation: 要解决的问题:提供一种提供有保证的分布式故障通知的方法。 解决方案:故障通知(FN)功能允许使用该功能的应用程序创建应用程序关联应用程序状态的FN组。 应用程序在FN组中的一个节点的FN功能中注册一个故障处理程序,每个故障处理程序与一个特定的FN组相关联。 当FN功能了解给定节点上的FN组中的故障时,该功能将在节点上执行相关的故障处理程序。 应用程序检测到的系统故障使用该功能向其他FN组成员发信号。 此功能检测在实现此功能的覆盖网络中发生的系统故障,并向其他FN组成员发出故障通知。 版权所有(C)2005,JPO&NCIPI

    STRATEGIES FOR INVESTIGATING AND MITIGATING VULNERABILITIES CAUSED BY THE ACQUISITION OF CREDENTIALS

    公开(公告)号:CA2666351A1

    公开(公告)日:2008-06-12

    申请号:CA2666351

    申请日:2007-12-06

    Applicant: MICROSOFT CORP

    Abstract: A strategy is described for assessing and mitigating vulnerabilities with in a data processing environment. The strategy collects access data that ref lects actual log-in behavior exhibited by users in the environment. The stra tegy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rig hts data, the strategy identifies how a user or other entity that gains acce ss to one part of the environment can potentially compromise additional part s of the environment. The strategy can recommend and implement steps aimed a t reducing any identified vulnerabilities.

    Strategies for investigating and mitigating vulnerabilities caused by the acquisition of credentials

    公开(公告)号:AU2007329251A1

    公开(公告)日:2008-06-12

    申请号:AU2007329251

    申请日:2007-12-06

    Applicant: MICROSOFT CORP

    Abstract: A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.

    5.
    发明专利
    未知

    公开(公告)号:BRPI0717967A2

    公开(公告)日:2013-11-12

    申请号:BRPI0717967

    申请日:2007-12-06

    Applicant: MICROSOFT CORP

    Abstract: A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.

    6.
    发明专利
    未知

    公开(公告)号:NO20092523L

    公开(公告)日:2009-07-06

    申请号:NO20092523

    申请日:2009-07-06

    Applicant: MICROSOFT CORP

    Abstract: A strategy is described for assessing and mitigating vulnerabilities within a data processing environment. The strategy collects access data that reflects actual log-in behavior exhibited by users in the environment. The strategy also collects rights data that reflects the rights possessed by one or more administrators within the environment. Based on the access data and rights data, the strategy identifies how a user or other entity that gains access to one part of the environment can potentially compromise additional parts of the environment. The strategy can recommend and implement steps aimed at reducing any identified vulnerabilities.

Patent Agency Ranking