Kevin Kingdon - Freemont CA Randal Earl Childers - Orem UT DeeAnne Higley - Provo UT Dale R. Olds - Sandy UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
H04L 1228
US Classification:
39520031
Abstract:
A method and apparatus for providing access control to objects in a distributed network directory employing static resolution to resolve object attributes. A first object has a Security Equals attribute and a second object has an Equivalent To Me attribute. Upon receiving a request for the first object to access the second object, authorization of such access is verified by checking if the two attributes are synchronized. The attributes are synchronized when the Security Equals attribute of the first object includes the second object, and the Equivalent To Me attribute of the second object includes the first object. A method of synchronizing the two attributes is also disclosed.
Method And Apparatus To Secure Digital Directory Object Changes
Kevin Kingdon - Orem UT Randal Earl Childers - Orem UT DeeAnne Higley - Provo UT Dale R. Olds - Sandy UT
Assignee:
Novell, Inc. - Orem UT
International Classification:
H04L 900
US Classification:
364514C
Abstract:
A method of providing authoritative access control to computer networks that employs a distributed network directory using a static means of resolving object attributes is disclosed. The method employs the existing directories and an authentication procedure for each server. A first object that is under the physical control of the administrator of one partition of the distributed network directory requests access to a second object that is under the physical control of the administrator of another partition of the distributed network directory. The directory verifies that the access control list of the first object includes the second object. The access control list of the second object is then checked to verify that it includes a reference to the first object as an object that is permitted access to the second object. As a result, access is only granted in response to requests from objects that appear in the access control list of the second object. A method of synchronizing the access control lists based upon an authoritative access control list is also disclosed.
System And Method For Caching Identification And Location Information In A Computer Network
Christopher Jenkins - Springville UT Randal Childers - Lindon UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 1730
US Classification:
707 10
Abstract:
Methods and systems are provided for caching information in a distributed computer system such as a directory service system. Tuples in a client cache contain component identifiers and corresponding location identifiers. Tuples may contain a list of network addresses specifying at least one server containing additional location or object information, as well as replica flags which distinguish between read-only replicas, read-write replicas, and a master replica. Requests to access an object may be serviced by using cached information rather than making one or more attempts to obtain location information from servers. Tuples may be modified or invalidated such that read operations tend to be performed using read-only replicas. Cached tuples which contain a component identifier that is no longer valid because an object was moved or renamed may be invalidated. The cache may also be modified to redirect operations from a master replica to a non-master replica.
System And Method For Caching Identification And Location Information In A Computer Network
Christopher Jenkins - Springville UT Randal Childers - Lindon UT
Assignee:
Novell, Inc. - Provo UT
International Classification:
G06F 1500
US Classification:
707 10
Abstract:
Methods and systems are provided for caching information in a distributed computer system such as a directory service system. Tuples in a client cache contain component identifiers and corresponding location identifiers. Tuples may contain a list of network addresses specifying at least one server containing additional location or object information, as well as replica flags which distinguish between read-only replicas, read-write replicas, and a master replica. Requests to access an object may be serviced by using cached information rather than making one or more attempts to obtain location information from servers. Tuples may be modified or invalidated such that read operations tend to be performed using read-only replicas. Cached tuples which contain a component identifier that is no longer valid because an object was moved or renamed may be invalidated. The cache may also be modified to redirect operations from a master replica to a non-master replica.
Probabilistic Event Classification Systems And Methods
- Milpitas CA, US Randal Earl Childers - Campbell CA, US Gerard Francis Livaudais - Kihei HI, US Stefanie Fenton - Reno NV, US Tim Thompson - Delevan NY, US Sandra Foley - San Jose CA, US Jeffrey Greene - San Francisco CA, US
Assignee:
Quantros, Inc. - Milpitas CA
International Classification:
G06F 19/00
US Classification:
705 3
Abstract:
Probabilistic event classifications systems and method are provided herein. In one embodiment, a method includes receiving an event narrative, the event narrative comprising textual content describing a safety event, parsing the textual content to identify key terms, searching a safety event database for classifications associated with the key terms, selecting a set of classifications based on the key terms using statistical analysis, the set of classifications comprising potential event types for the event narrative, and displaying the set of classifications for the event narrative via a graphical user interface.