WO2012136584A3 - Management system - Google Patents
Management system Download PDFInfo
- Publication number
- WO2012136584A3 WO2012136584A3 PCT/EP2012/055793 EP2012055793W WO2012136584A3 WO 2012136584 A3 WO2012136584 A3 WO 2012136584A3 EP 2012055793 W EP2012055793 W EP 2012055793W WO 2012136584 A3 WO2012136584 A3 WO 2012136584A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer system
- model
- processing
- management system
- perform
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/107—Computer-aided management of electronic mailing [e-mailing]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
Management system and method of implementing a management system for facilitating processing of at least one computer system comprising data. A model of the computer system(s) is generated using the results of an inspection of the computer system(s), the model being configured to validly interact with each of the computer system(s) based on the results of the inspection of the computer system(s). Processing means of the management system define a processing operation to be performed on the computer system(s). The processing means perform the processing operation by interacting with the model wherein the model is arranged to then interact with the computer system(s) to thereby perform the processing operation. Information relating to permissible operations which are capable of being performed by the model on the computer system(s) is determined, and the determined information is used to check that the processing operation defined by the processing means is a permissible operation which is capable of being performed by the model on the computer system(s) without the need to ever perform the processing operations.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1105669.4A GB2489915A (en) | 2011-04-04 | 2011-04-04 | Management system for processing data |
GB1105669.4 | 2011-04-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012136584A2 WO2012136584A2 (en) | 2012-10-11 |
WO2012136584A3 true WO2012136584A3 (en) | 2012-12-20 |
Family
ID=44071913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2012/055793 WO2012136584A2 (en) | 2011-04-04 | 2012-03-30 | Management system |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB2489915A (en) |
WO (1) | WO2012136584A2 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030191838A1 (en) * | 2002-04-05 | 2003-10-09 | Tsao Sheng (Ted) Tai | Distributed intelligent virtual server |
US20050120160A1 (en) * | 2003-08-20 | 2005-06-02 | Jerry Plouffe | System and method for managing virtual servers |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015674A1 (en) * | 2003-07-01 | 2005-01-20 | International Business Machines Corporation | Method, apparatus, and program for converting, administering, and maintaining access control lists between differing filesystem types |
US8494824B2 (en) * | 2009-02-16 | 2013-07-23 | The Boeing Company | Methods and apparatus for integrating engineering models from disparate tools in support of model reuse |
US8631477B2 (en) * | 2009-07-23 | 2014-01-14 | International Business Machines Corporation | Lifecycle management of privilege sharing using an identity management system |
-
2011
- 2011-04-04 GB GB1105669.4A patent/GB2489915A/en not_active Withdrawn
-
2012
- 2012-03-30 WO PCT/EP2012/055793 patent/WO2012136584A2/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030191838A1 (en) * | 2002-04-05 | 2003-10-09 | Tsao Sheng (Ted) Tai | Distributed intelligent virtual server |
US20050120160A1 (en) * | 2003-08-20 | 2005-06-02 | Jerry Plouffe | System and method for managing virtual servers |
Also Published As
Publication number | Publication date |
---|---|
WO2012136584A2 (en) | 2012-10-11 |
GB2489915A (en) | 2012-10-17 |
GB201105669D0 (en) | 2011-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2012168886A3 (en) | Method and apparatus for contextual gesture recognition | |
WO2018224055A3 (en) | Multi-dimensional data abnormality detection method and apparatus | |
EP3055785A4 (en) | Computer implemented method, computer system and software for reducing errors associated with a situated interaction | |
WO2012154664A3 (en) | Methods, systems, and computer readable media for detecting injected machine code | |
EP2775404B8 (en) | Information processing apparatus, information processing system, information processing method and computer program | |
GB2494487B (en) | Flight data validation apparatus and method | |
MX347584B (en) | System, method, apparatus, and computer program product for providing mobile device support services. | |
MX342662B (en) | System, method, apparatus, and computer program product for providing mobile device support services. | |
WO2012143603A3 (en) | Methods and apparatuses for facilitating gesture recognition | |
GB2506803A (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
GB2509036A (en) | Providing a network-accessible malware analysis | |
BR112014030585A2 (en) | information processing system, method performed by an information processing system, and non-transient computer readable medium | |
WO2014028648A3 (en) | System and method for forming predictions using event-based sentiment analysis | |
BR112013023014A2 (en) | method for evaluating an underground formation, and executable software structure in a computer processing system for evaluating an underground formation | |
WO2013076596A3 (en) | Apparatus and method for providing for scrolling a filtered list | |
WO2014151088A3 (en) | Systems and methods for genomic variant annotation | |
EP2708988A3 (en) | Method for operating electronic device based on touch pressure and the device performing the method | |
BR112013007719A2 (en) | apparatus and method of processing information, and non-transient recording medium with a computer readable program | |
BR112013017073A2 (en) | apparatus for detecting asymmetry in an object, method for detecting asymmetry, computer readable medium having a software and system for detecting brain diseases. | |
CL2013001721A1 (en) | Method to increase an online presence taking advantage of the sensors of a portable computing device that comprises receiving one of the status change data, comparing the status change data and updating the information according to the corresponding online presence status. | |
WO2012166397A3 (en) | Operator state checkpoints | |
CL2015000449A1 (en) | Component version management system for a machine, comprising a software-driven component located on the machine, a data system located outside the machine, and a data system controller in communication with the software-driven component and the data system, controller configured to automatically collect software and hardware version information, analyze the information, and generate notification when mismatch is detected; associated method | |
GB201203233D0 (en) | Method and device for a meta data fragment from a metadata component associated with multimedia data | |
BR112013023556A2 (en) | apparatus for dynamic data normalization for perfusion comparison and quantification, method for dynamic data normalization for perfusion comparison and quantification, computer readable media, program element, processing device and method for operating a device. | |
MX360064B (en) | Method of checking producibility of a composite security design of a security document on a line of production equipment and digital computer environment for implementing the same. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12713118 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12713118 Country of ref document: EP Kind code of ref document: A2 |