首页>
外国专利>
Computer security application configuration structure employing independently specified configuration objects and separate resolver
Computer security application configuration structure employing independently specified configuration objects and separate resolver
展开▼
机译:采用独立指定的配置对象和单独的解析器的计算机安全应用程序配置结构
展开▼
页面导航
摘要
著录项
相似文献
摘要
An information security application responds to a request by generating a context vector and performing a lookup in a configuration structure to identify a configurable action to be taken. The context vector includes current values of environment variables. The configuration structure stores configuration objects having an environment field storing configured values of the environment variables to specify a context for use of an action value in an action field. A wildcard value indicates that the context for use is independent of a given environment variable. The lookup results in a set of configuration objects whose configured values of the environment variables either are wildcards or match respective values in the context vector. The set of action values is resolved to a resolved action value specifying the configurable action, and a response is returned to the client computer based on a result of the configurable action.
展开▼