UNIVERSAL SCHEMA FOR REPRESENTING MANAGEMENT POLICY
First Claim
1. A computer-readable storage medium having a data structure stored thereon for constructing expressions representing software configurations to be applied to software, said data structure comprising:
- a first data field including data identifying a name of software configuration for the software;
a second data field including data representing an assertion portion of a policy rule for configuring the configurations identified in the first data field to be applied to the software;
a third data field including data representing an action portion of the rule, wherein the second data field and the third data field forming the policy rule; and
a fourth data field storing metadata describing the policy rule represented by the first data field, the second data field, and the third data field.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-readable storage medium has a data structure stored thereon for constructing expressions representing software configurations to be applied to software. The data structure includes a first data field including data identifying a name of software setting for the application. A second data field includes data representing an assertion portion of an policy rule for configuring the configurations identified in the first data field to be applied to the software. The data structure also includes a third data field storing data representing an action portion of the policy rule. The second data field and the third data field form the policy rule. A fourth data field stores metadata describing the policy rule represented by the first data field, the second data field, and the third data field.
-
Citations
20 Claims
-
1. A computer-readable storage medium having a data structure stored thereon for constructing expressions representing software configurations to be applied to software, said data structure comprising:
-
a first data field including data identifying a name of software configuration for the software; a second data field including data representing an assertion portion of a policy rule for configuring the configurations identified in the first data field to be applied to the software; a third data field including data representing an action portion of the rule, wherein the second data field and the third data field forming the policy rule; and a fourth data field storing metadata describing the policy rule represented by the first data field, the second data field, and the third data field. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computerized method for representing constraints in policy rule in a policy document for managing software state of software, said computerized method comprising:
-
receiving an expression representing the policy rule in the policy document, said expression including operators and operands; identifying the operators and operands in the received expression; translating the operators and operands in the received expression to generate expression based on the translated operators and operands; and providing the constraints in the generated expression to the software, said constraints including values for managing the application state. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computerized method for identifying a configuration constraint for configuring policy rules from software, said computerized method comprising:
-
receiving a request from a target device to configure the application; identifying a constraint included in the received request, said identified constraints including values intending to modify software state of the software; and providing, from the application, the configuration constraint in response to the identification, said configuration constraint identifying an effective constraint for modifying the application state of the application. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification