Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-12-20
2005-12-20
Song, Hosuk (Department: 2135)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C713S001000
Reexamination Certificate
active
06978379
ABSTRACT:
An apparatus (22,44) is described for use in generating configuration information for a computer system (12) employing hierarchical entities.A policy template (24) is employed which contains a definition of an abstract high-level policy, for the configuration of the system, and permitted refinements to that policy, the definition referring to a plurality of the entities. An information and system model (16) contains information about the computer system and its environment including the entities referred to in the high-level policy definition, the hierarchy thereof and non-hierarchical relations between the entities. A policy authoring engine (26) refines the high-level policy definition with reference to the permitted refinements thereto and the stored information about the entities to which the high-level policy definition relates in order to produce a refined policy definition. In doing this, the engine presents refinement options to a user (10) via a user interface (28) and refines the high-level policy definition in dependence upon options selected by the user via the user interface. Some of the entities stored in the model (16) may be abstract entities, but with pointers to data in the computer system representing an instance of that abstract entity. The refined policy may be in terms of a policy context, referring to unbound entities, and a policy statement. A policy deployer (20) stores rules for interpreting the policy statement as instructions executable by the computer system and is operable, with reference to the information and system model (16), to bind the unbound entities in the policy context to instances of those entities, and, with reference to the stored rules, to interpret the policy statement into a series of instructions to the computer system referring to the bound instances or derivatives of them.The apparatus facilitates the refinement of abstract policies and implementation of the refined policies.
REFERENCES:
patent: 5751967 (1998-05-01), Raab et al.
patent: 5797128 (1998-08-01), Birnbaum
patent: 6256741 (2001-07-01), Stubblebine
patent: 6539026 (2003-03-01), Waclawsky
patent: 96/26588 (1996-08-01), None
patent: 98/54644 (1998-12-01), None
PC Week, n16, v2, p 14, Jan. 11, 1999, “Building Better PC Management,” Erica Schroder, ISSN: 0740-1604.
e-Business Advisor, v16, n11, p40, Nov. 1998, “Keep an Eye on Your Network,” Mike Finn.
Computer Shopper, v18, n2,p375, Feb. 1998, Pretty Good Privacy's PGP Certificate Server, William Wong, ISSN: 0886-0556.
Windows Sources, v5, n1,p205, Jan. 1997, “Be Master of Your Domain,” Joseph Moran, ISSN: 1065-9641.
Baldwin Adrian John
Goh Cheh
Marco Casassa Mont
Hewlett--Packard Development Company, L.P.
Song Hosuk
LandOfFree
Configuring computer systems does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Configuring computer systems, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Configuring computer systems will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3484914