DE112018002954T5 - Bereitstellen eines konfigurationsabhängigen arbeitsablaufs - Google Patents
Bereitstellen eines konfigurationsabhängigen arbeitsablaufs Download PDFInfo
- Publication number
- DE112018002954T5 DE112018002954T5 DE112018002954.9T DE112018002954T DE112018002954T5 DE 112018002954 T5 DE112018002954 T5 DE 112018002954T5 DE 112018002954 T DE112018002954 T DE 112018002954T DE 112018002954 T5 DE112018002954 T5 DE 112018002954T5
- Authority
- DE
- Germany
- Prior art keywords
- command
- computer
- validation
- actions
- configuration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
- G06F9/4887—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues involving deadlines, e.g. rate based, periodic
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/664,723 | 2017-07-31 | ||
| US15/664,723 US10380345B2 (en) | 2017-07-31 | 2017-07-31 | Delivering configuration based security and process workflows |
| PCT/IB2018/055633 WO2019025921A1 (en) | 2017-07-31 | 2018-07-27 | DISTRIBUTING A WORKFLOW BASED ON A CONFIGURATION |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| DE112018002954T5 true DE112018002954T5 (de) | 2020-04-02 |
Family
ID=65038701
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| DE112018002954.9T Pending DE112018002954T5 (de) | 2017-07-31 | 2018-07-27 | Bereitstellen eines konfigurationsabhängigen arbeitsablaufs |
Country Status (6)
| Country | Link |
|---|---|
| US (2) | US10380345B2 (enExample) |
| JP (1) | JP7291120B2 (enExample) |
| CN (1) | CN110945504B (enExample) |
| DE (1) | DE112018002954T5 (enExample) |
| GB (1) | GB2578411B (enExample) |
| WO (1) | WO2019025921A1 (enExample) |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10380345B2 (en) | 2017-07-31 | 2019-08-13 | International Business Machines Corporation | Delivering configuration based security and process workflows |
| US20190102713A1 (en) * | 2017-10-03 | 2019-04-04 | Avaya Inc. | Split enterprise/provider workflows |
| CN112541006B (zh) * | 2019-09-23 | 2023-01-06 | 拉扎斯网络科技(上海)有限公司 | 数据库命令请求处理方法、装置、电子设备及存储介质 |
| EP4200717A2 (en) | 2020-08-24 | 2023-06-28 | Unlikely Artificial Intelligence Limited | A computer implemented method for the automated analysis or use of data |
| CN111985902B (zh) * | 2020-08-25 | 2024-05-24 | 上海中云数赢云计算科技有限公司 | 跨系统信息协同管理方法、装置、设备和存储介质 |
| CN113254062B (zh) * | 2021-06-22 | 2021-11-09 | 苏州浪潮智能科技有限公司 | 一种bmc参数配置及生效的方法、装置、设备和介质 |
| US12452082B2 (en) * | 2023-04-28 | 2025-10-21 | Dell Products L.P. | System and method for securing data processing systems through recognition and analysis of commands |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7107285B2 (en) * | 2002-03-16 | 2006-09-12 | Questerra Corporation | Method, system, and program for an improved enterprise spatial system |
| US6957363B2 (en) | 2002-03-27 | 2005-10-18 | International Business Machines Corporation | Method and apparatus for controlling the termination of processes in response to a shutdown command |
| US7240879B1 (en) * | 2005-05-06 | 2007-07-10 | United States of America as represented by the Administration of the National Aeronautics and Space Administration | Method and associated apparatus for capturing, servicing and de-orbiting earth satellites using robotics |
| US7587724B2 (en) | 2005-07-13 | 2009-09-08 | Symantec Corporation | Kernel validation layer |
| US8694322B2 (en) * | 2005-08-05 | 2014-04-08 | Microsoft Corporation | Selective confirmation for execution of a voice activated user interface |
| CN1960273A (zh) | 2005-11-01 | 2007-05-09 | 杭州帕拉迪网络科技有限公司 | Unix终端用户输入逻辑命令动态实时捕获方法 |
| JP2009003726A (ja) * | 2007-06-22 | 2009-01-08 | Nec Corp | 保守装置、保守システム、保守方法、およびプログラム |
| JP5141460B2 (ja) * | 2008-09-11 | 2013-02-13 | 富士通株式会社 | 制御プログラム、情報処理システム、および情報処理方法 |
| US8561090B2 (en) | 2009-02-26 | 2013-10-15 | Red Hat, Inc. | Method and an apparatus to implement secure system call wrappers |
| US8515763B2 (en) * | 2009-11-24 | 2013-08-20 | Honeywell International Inc. | Methods and systems for utilizing voice commands onboard an aircraft |
| US9021178B2 (en) * | 2011-05-02 | 2015-04-28 | Western Digital Technologies, Inc. | High performance path for command processing |
| US9262208B2 (en) | 2012-08-20 | 2016-02-16 | International Business Machines Corporation | Automated, controlled distribution and execution of commands and scripts |
| US8893222B2 (en) | 2012-11-13 | 2014-11-18 | Auckland Uniservices Ltd. | Security system and method for the android operating system |
| US9916133B2 (en) * | 2013-03-14 | 2018-03-13 | Microsoft Technology Licensing, Llc | Software release workflow management |
| US20160260157A1 (en) * | 2015-03-05 | 2016-09-08 | International Business Machines Corporation | Rapid service orchestration and management |
| US9692653B1 (en) * | 2015-12-17 | 2017-06-27 | International Business Machines Corporation | Automatic generation of validators to validate deployment code used for configuring servers |
| CN106709283A (zh) | 2016-11-17 | 2017-05-24 | 上海斐讯数据通信技术有限公司 | 一种防止程序误操作的方法及系统 |
| US10380345B2 (en) | 2017-07-31 | 2019-08-13 | International Business Machines Corporation | Delivering configuration based security and process workflows |
-
2017
- 2017-07-31 US US15/664,723 patent/US10380345B2/en active Active
-
2018
- 2018-07-27 JP JP2020504307A patent/JP7291120B2/ja active Active
- 2018-07-27 WO PCT/IB2018/055633 patent/WO2019025921A1/en not_active Ceased
- 2018-07-27 CN CN201880048861.3A patent/CN110945504B/zh active Active
- 2018-07-27 GB GB2002264.6A patent/GB2578411B/en active Active
- 2018-07-27 DE DE112018002954.9T patent/DE112018002954T5/de active Pending
-
2019
- 2019-06-28 US US16/455,886 patent/US10885194B2/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| US20190034636A1 (en) | 2019-01-31 |
| JP7291120B2 (ja) | 2023-06-14 |
| GB202002264D0 (en) | 2020-04-01 |
| CN110945504A (zh) | 2020-03-31 |
| US10885194B2 (en) | 2021-01-05 |
| WO2019025921A1 (en) | 2019-02-07 |
| GB2578411B (en) | 2020-09-30 |
| GB2578411A (en) | 2020-05-06 |
| US10380345B2 (en) | 2019-08-13 |
| CN110945504B (zh) | 2023-08-29 |
| US20190318096A1 (en) | 2019-10-17 |
| JP2020529661A (ja) | 2020-10-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE112018002954T5 (de) | Bereitstellen eines konfigurationsabhängigen arbeitsablaufs | |
| DE112021005636T5 (de) | Migrieren von komplexen legacy-anwendungen | |
| DE112018002031T5 (de) | Sichern einer betriebssystemkonfiguration unter verwendung von hardware | |
| DE102017217971A1 (de) | Ermöglichen von Debugging von serverlosen Anwendungen mittels Graph-Rewriting | |
| DE102021130957A1 (de) | Empfehlungen zur stabilität von software-aktualisierungen | |
| DE112018003006T5 (de) | Erkennung und entschärfung von angriffen von aussen bei der datenverarbeitung | |
| DE112010003144T5 (de) | Erweiterbare Grundstruktur zur Unterstützung verschiedener Einsatzarchitekturen | |
| DE112019001433T5 (de) | Datenanonymisierung | |
| DE112018005898T5 (de) | Dynamische bereitstellung von software-funktionen | |
| DE102016101779A1 (de) | Feedback-Analyse für ein zeitliches Planen eines Verwalters für virtuelle Maschinen | |
| DE102012210368A1 (de) | Hinterlegung und Optimierung von Quellcode für trusted Computing | |
| DE112016005571T5 (de) | Aufrufergeschützte stapelrücksprungadresse in einer hardware-verwalteten stapelarchitektur | |
| DE112016000576T5 (de) | Sicheres Booten eines Computers von einer für den Benutzer vertrauenswürdigen Einheit aus | |
| DE102021130396A1 (de) | Datenzugriffsüberwachung und -steuerung | |
| DE112021000338B4 (de) | Auslagern der statistikerfassung | |
| DE112021005848B4 (de) | Koordinieren von in einer skalierbaren anwendung umgesetzten anfragen | |
| DE112019003130T5 (de) | Hsm-selbstzerstörung in einer hybriden cloud-kms-lösung | |
| DE102016103713A1 (de) | Erkennung virtueller Maschineneinheiten auf der Grundlage eines Katalogs | |
| DE112018000525T5 (de) | Systeme und Verfahren für die Authentifizierung von Platform Trust bzw. Plattform-Vertrauen in einerNetzwerkfunktions-Virtualisierungsumgebung | |
| DE112020004806T5 (de) | Cluster-sicherheit auf der grundlage von inhalten virtueller maschinen | |
| DE112021004115B4 (de) | Sicherheitssystem für eine Segmentierung von Computerdatei-Metadaten | |
| DE112020003578B4 (de) | Mindern von bedrohungen von arbeitslasten auf grundlage von containern | |
| DE112017004160T5 (de) | Schützen eines Webservers vor einer nicht autorisierten Client-Anwendung | |
| DE112017005772T5 (de) | Zeitpunktgesteuerte sicherungen über einen speicher-controller in eine objektspeicher-cloud | |
| DE112022005012T5 (de) | Techniken zum erstellen und validieren von datenbanksoftware in einer gemeinsam genutzten verwaltungsumgebung |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| R012 | Request for examination validly filed | ||
| R081 | Change of applicant/patentee |
Owner name: KYNDRYL, INC., NEW YORK, US Free format text: FORMER OWNER: INTERNATIONAL BUSINESS MACHINES CORPORATION, ARMONK, NY, US |