会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 34. 发明申请
    • CLOUD-BASED DEVICE SYNCHRONIZATION
    • 基于云的设备同步
    • US20120079095A1
    • 2012-03-29
    • US12890314
    • 2010-09-24
    • Ethan Z. EvansLuis Felipe CabreraHilliard Bruce SiegelPeter N. DeSantis
    • Ethan Z. EvansLuis Felipe CabreraHilliard Bruce SiegelPeter N. DeSantis
    • G06F15/16
    • G06F9/4451G06F8/61G06F16/27H04L67/04H04L67/1095Y02D10/42Y02D10/43
    • A logically centralized system or service, such as a cloud-based content management service, enables intelligent communication between disparate devices. Such communication enables content such as applications and data to be synchronized between various devices, where the synchronization takes into account the capabilities of each device to provide versions and/or formats of that content that are appropriate for each device. A user purchasing an additional device, for example, can have various applications and other content automatically installed or copied over to the additional device, but with versions or formats that take advantage of, and are appropriate for, the capabilities of that additional device. Further, the intelligent communication via a logically centralized service can enable such devices to interact even though those devices might utilize different protocols and/or formats, and might otherwise not be able to communicate or have ever have been tested together.
    • 逻辑上集中的系统或服务(如基于云的内容管理服务)可实现不同设备之间的智能通信。 这种通信使得诸如应用和数据之类的内容能够在各种设备之间同步,其中同步考虑到每个设备提供适合于每个设备的内容的版本和/或格式的能力。 例如,购买附加设备的用户可以具有自动安装或复制到附加设备的各种应用和其他内容,但是具有利用并适合于该附加设备的能力的版本或格式。 此外,即使这些设备可能利用不同的协议和/或格式,通过逻辑上集中式服务的智能通信也可以使这些设备进行交互,否则可能无法进行通信或已经一起进行了测试。
    • 35. 发明授权
    • Secure internet-scale eventing
    • 安全的互联网规模事件
    • US08086849B2
    • 2011-12-27
    • US10210067
    • 2002-08-02
    • Christopher G. KalerJohn P. ShewchukGiovanni Moises Della-LiberaLuis Felipe Cabrera
    • Christopher G. KalerJohn P. ShewchukGiovanni Moises Della-LiberaLuis Felipe Cabrera
    • H04L9/00
    • H04L63/0428H04L63/08H04L63/126
    • A method and system are provided for delivering event messages in a secure scalable manner. A network includes an event distribution device serving as an event generation device for generating and disseminating an event message through the network to event distribution devices serving as edge event delivery devices having recipient devices connected thereto. Event messages may be encrypted at the event generation device for each of the destination recipient devices or event messages may be encrypted at each of the edge event delivery devices for delivery to respective recipient devices connected thereto. A signing key may also be included with the encrypted message such that the respective recipient devices may authenticate a sender of the encrypted message based on the signing key. Encryption keys may be established based on policies of the network of event distribution devices or based on policies of the respective recipient devices.
    • 提供了一种以安全可伸缩的方式传送事件消息的方法和系统。 网络包括作为事件发生设备的事件发布设备,用于通过网络生成和传播事件消息到用作具有连接到其的接收设备的边缘事件传递设备的事件分发设备。 事件消息可以在每个目的地接收者设备的事件生成设备处被加密,或者可以在每个边缘事件传递设备处对事件消息进行加密,以便递送到与之相连接的相应接收者设备。 签名密钥也可以包含在加密的消息中,使得相应的接收者设备可以基于签名密钥来认证加密消息的发送者。 加密密钥可以基于事件分发设备的网络的策略或基于各个接收方设备的策略来建立。
    • 36. 发明授权
    • Facilitating performance by task performers of language-specific tasks
    • 促进任务执行者对语言特定任务的表现
    • US08046250B1
    • 2011-10-25
    • US11537552
    • 2006-09-29
    • Peter D. CohenLuis Felipe CabreraChristopher E. Smoak
    • Peter D. CohenLuis Felipe CabreraChristopher E. Smoak
    • G06Q10/00
    • G06Q10/00G06Q10/06G06Q10/06311G06Q10/06398G06Q10/1097G06Q30/08
    • Techniques are described for facilitating interactions between task requesters who have tasks that are available to be performed and task performers who are available to perform tasks, such as by an intermediary electronic marketplace or other task fulfillment facilitator system. In some situations, support is provided in various ways for using multiple human languages when supplying and performing tasks. For example, some tasks may have associated languages, and some tasks may further have multiple task variants that each have a distinct associated language. A user may then request information about tasks in a particular language, and receive information about tasks and/or task variants associated with that language. Furthermore, some tasks and task variants may further be associated with locales that include particular languages and/or various other factors, including geographical areas, and such locales may similarly be used to identify appropriate corresponding users that match the various locale factors.
    • 描述了用于促进具有可执行任务的任务请求者和可用于执行任务的任务执行者之间的交互的技术,例如通过中间电子市场或其他任务执行促进器系统。 在某些情况下,在提供和执行任务时,以各种方式提供支持以使用多种人类语言。 例如,一些任务可能具有相关联的语言,并且一些任务可以进一步具有各自具有不同相关语言的多个任务变体。 然后,用户可以请求关于特定语言的任务的信息,并且接收关于与该语言相关联的任务和/或任务变体的信息。 此外,一些任务和任务变体还可以与包括特定语言和/或各种其他因素(包括地理区域)的区域设置相关联,并且这样的区域可以类似地用于识别与各种区域因素匹配的适当的对应用户。
    • 38. 发明授权
    • Hidden proactive replication of data
    • 隐藏主动复制数据
    • US07631359B2
    • 2009-12-08
    • US10289988
    • 2002-11-06
    • Luis Felipe CabreraMarvin M. TheimerChristopher G. Kaler
    • Luis Felipe CabreraMarvin M. TheimerChristopher G. Kaler
    • G06F21/00H04L9/00
    • G06F21/6272
    • Moving replicas in a cryptographically secure manner such that the target location and timing of the movements are completely hidden from any user, or is kept as a secret by a limited number of users who have been given advanced notice of the new location and relocation time for a replica. A catalog of replica locations that describe the current location of the replicas is stored in encrypted form so as to prevent individuals from determining the exact location of the replicas. Since the location of the replicas is hidden at any given moment, attackers may not use the location of the replicas in order to attack all of the replicas at the same time. Accordingly, recovery mechanisms may have an opportunity to recover from any given attack by once again creating replicas from those replicas that had not been attacked.
    • 以加密安全的方式移动副本,使得移动的目标位置和定时完全被任何用户隐藏,或者被有限数量的用户保持为秘密,这些用户被提前通知新位置和重定位时间 一个副本。 描述副本的当前位置的副本位置的目录以加密形式存储,以防止个人确定副本的确切位置。 由于副本的位置在任何给定的时刻被隐藏,所以攻击者可能不会使用副本的位置来同时攻击所有的副本。 因此,恢复机制可能有机会从任何给定的攻击中恢复,从而再次从未受到攻击的副本创建副本。
    • 39. 发明授权
    • Deterministic rule-based dispatch of objects to code
    • 确定性的基于规则的调度对象到代码
    • US07624141B2
    • 2009-11-24
    • US10763530
    • 2004-01-23
    • Luis Felipe CabreraGeorge P. Copeland
    • Luis Felipe CabreraGeorge P. Copeland
    • G06F15/16
    • G06F9/547G06F9/449G06F9/548
    • Deterministic rule-based dispatch of the data structure to a group of one or more methods. After accessing the data structure to be processed, a list of rules is evaluated to identify multiple rules that apply to the dispatch of the data structure. Each of these multiple rules specifies a different group of one or more methods to which the data structure should be dispatched. The multiple rules are resolved to a single prevailing rule that will be applied for the dispatch of the data structure. Then, the computing system dispatches the data structure to the group of one or more methods specified by the prevailing rule. The rule evaluation and prioritization is deterministic for ease in debugging since it may be determined which group of one or more methods processed a data structure should a performance problem arise during the processing. Furthermore, rules may be added, amended, or deleted dynamically.
    • 确定性的基于规则的数据结构调度到一组或多个方法。 在访问要处理的数据结构之后,将对规则列表进行评估,以确定适用于数据结构调度的多个规则。 这些多个规则中的每一个规定了要分配数据结构的一个或多个方法的不同组。 多个规则被解决为将应用于数据结构调度的单一主要规则。 然后,计算系统将数据结构分派到由普遍规则指定的一种或多种方法的组中。 规则评估和优先次序对于易于调试是确定性的,因为可以确定在处理期间出现性能问题时,哪一组一个或多个方法处理数据结构。 此外,可以动态添加,修改或删除规则。