会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • Communications security management
    • 通信安全管理
    • US09460269B2
    • 2016-10-04
    • US13562580
    • 2012-07-31
    • Lisa Seacat DeLucaLydia M. DoJenny S. Li
    • Lisa Seacat DeLucaLydia M. DoJenny S. Li
    • H04L29/06G06F21/62G06F21/00G06F21/56
    • G06F21/00G06F21/56G06F21/6218H04L63/08H04L63/102
    • Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.
    • 实现通信安全包括创建与入站通信关联的权限级别。 权限级别指示能够传送到接收方计算机的通信的组件。 通信安全还包括创建条件,当前分配的权限级别可调整到下一级权限级别。 响应于识别从发送者接收到的入站通信,通信安全性评估入站通信的内容,响应于评估确定入站通信的信任值,将条件应用于入站通信和发送者,确定 响应于应用条件的入站通信的权限级别之一,并且基于权限级别的分配,将入站通信发送到接收方计算机,包括允许传输的任何组件。
    • 52. 发明授权
    • Determining resource instance placement in a networked computing environment
    • 确定联网计算环境中的资源实例布局
    • US09229784B2
    • 2016-01-05
    • US13238373
    • 2011-09-21
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F9/50
    • G06F9/45558G06F9/5077G06F2009/4557G06F2009/45595G06F2209/501G06F2209/502H04L47/822H04L67/1021
    • Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center.
    • 本发明的实施例提供了一种用于基于网络特性(例如,物理位置,电子邮件地址/服务器)的网络计算环境(例如,云计算环境)中的虚拟资源实例(例如,服务器实例等) 虚拟资源实例的预期最终用户的集合(至少一个)的配置,配置,网络连接类型,因特网协议(IP)地址等)。 具体地,在典型的实施例中,将收集和分析与该组预期最终用户相关联的网络特性(例如,以确定最终用户位置等)。 网络特性的分析将用于计算/确定针对虚拟资源实例的一组潜在数据中心的每个预期最终用户的相对(例如,网络)效率得分。 每个潜在数据中心的相对效率分数将被相加/合计,以产生每个潜在数据中心的总计(例如网络)效率得分。 此后,可以选择具有最高/最佳总效率得分的特定数据中心,并且可以在该数据中心处提供所请求的资源实例。
    • 55. 发明授权
    • Pre-transmission contextual electronic message prompting
    • 预传输上下文电子消息提示
    • US09147181B2
    • 2015-09-29
    • US13313540
    • 2011-12-07
    • Lisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Lisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F15/16G06Q10/10H04L12/24
    • G06Q10/107H04L41/026
    • Embodiments of the present invention provide a system, method, and program product to provide to a user creating an electronic message one or more informational messages related to the content and addressees of the electronic message. A computer system identifies one or more addressees of the electronic message created by the user. The computer system identifies any informational messages associated with each of the addressees, and displays to the user the identified informational messages. Each step is performed prior to the computer system transmitting the electronic message for delivery to any addressee. The informational messages can be predefined by the addressees of the electronic message and include hyperlinks and other programmable elements for execution by the user. The electronic message can be an e-mail, instant message, or other form of electronic message.
    • 本发明的实施例提供一种系统,方法和程序产品,以向用户提供与电子消息的内容和收件人相关的一个或多个信息消息创建电子消息。 计算机系统识别由用户创建的电子消息的一个或多个收件人。 计算机系统识别与每个收件人相关联的任何信息性消息,并向用户显示所识别的信息性消息。 在计算机系统发送电子消息之前执行每个步骤以传送给任何收件人。 信息消息可以由电子消息的收件人预定义,并且包括用于由用户执行的超链接和其他可编程元素。 电子消息可以是电子邮件,即时消息或其他形式的电子消息。
    • 57. 发明授权
    • Source control inheritance locking
    • 源代码控制继承锁定
    • US09058339B2
    • 2015-06-16
    • US13604928
    • 2012-09-06
    • Albert A. DeLuccaLisa Seacat DeLucaSoobaek JangTroy Michael Volin
    • Albert A. DeLuccaLisa Seacat DeLucaSoobaek JangTroy Michael Volin
    • G06F17/30G06F7/00
    • G06F17/30171G06F17/30607
    • An embodiment of the invention provides a method for source control in a program, wherein the program includes hierarchical files for execution of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. This includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. This includes disallowing revisions to the one or more files that are descendents of a file in the revised process.
    • 本发明的一个实施例提供了一种程序中的源控制方法,其中该程序包括用于执行进程的分层文件,其中分层文件包括父文件和子文件。 识别用户在图形用户界面上选择的修改过程; 并且确定了修改过程中的文件。 修改过程中的文件被源控制处理器锁定。 这包括不修改修订过程中的文件。 识别在修改过程中作为文件后代的一个或多个文件。 作为修改过程中的文件的后代的一个或多个文件与源控制处理器锁定。 这包括不修改修订过程中文件后缀的一个或多个文件。
    • 59. 发明授权
    • Application component decomposition and deployment
    • 应用程序组件的分解和部署
    • US08918448B2
    • 2014-12-23
    • US13470090
    • 2012-05-11
    • Lisa Seacat DeLucaBrian D. GoodmanSoobaek Jang
    • Lisa Seacat DeLucaBrian D. GoodmanSoobaek Jang
    • G06F15/16
    • G06F8/61
    • A computer implemented method, a data processing system, and a computer program product deploy application components within a distributed environment. A Runtime management platform opens an application archive for an application to be deployed onto a distributed computing environment. The runtime management platform identifies a set of application components for the application. The runtime management platform identifies at least one set of rules defining application component deployment patterns for the set of application components. The runtime management platform deploys the set of application components to a set of runtime containers according to the at least one set of rules defining the application component deployment patterns.
    • 计算机实现的方法,数据处理系统和计算机程序产品在分布式环境中部署应用程序组件。 运行时管理平台为要部署到分布式计算环境的应用程序打开应用程序归档。 运行时管理平台识别应用程序的一组应用程序组件。 运行时管理平台确定定义应用程序组件集合的应用程序组件部署模式的至少一组规则。 运行时管理平台根据定义应用程序组件部署模式的至少一组规则将该组应用程序组件部署到一组运行时容器。