会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • System and method for enhanced computer telephony integration and interaction
    • 用于增强计算机电话集成和交互的系统和方法
    • US20050047395A1
    • 2005-03-03
    • US10651468
    • 2003-08-29
    • Attila NarinJonathan CadizAnoop GuptaGavin JanckeMichael Boyle
    • Attila NarinJonathan CadizAnoop GuptaGavin JanckeMichael Boyle
    • H04L12/66H04M3/00H04M3/42H04M3/51H04Q3/58
    • H04M3/42323H04M3/42272H04M3/5125H04M3/5183
    • An enhanced computer telephony integration system that facilitates the interaction and integration of a private branch exchange (PBX) with a client computer on a computer network. An enhanced telephony (ET) server connects to the PBX and to all running instances of an ET client on a user's computers. The ET server acts as a proxy between the ET clients and the PBX. The ET clients register with the ET server for a certain telephone extension. The ET server then can forward telephone action requests (such as placing a telephone call) from the registered ET clients to the PBX servicing the telephone extension. Moreover, the ET server can relay telephone events (such as an incoming call) from the PBX to all registered clients. The ET server facilitates seamless integration of telephone and personal computer features to provide a rich user-controlled computer-telephone integration for a user.
    • 一种增强的计算机电话集成系统,其促进专用小交换机(PBX)与计算机网络上的客户端计算机的交互和集成。 增强型电话(ET)服务器连接到PBX以及用户计算机上ET客户端的所有运行实例。 ET服务器充当ET客户端和PBX之间的代理。 ET客户端向ET服务器注册某个电话分机。 然后,ET服务器可以将来自注册的ET客户端的电话操作请求(例如拨打电话)转发到为电话分机服务的集团电话。 此外,ET服务器可以将电话事件(例如来电)从PBX转发到所有注册的客户端。 ET服务器便于电话和个人计算机功能的无缝集成,为用户提供丰富的用户控制的计算机电话集成。
    • 3. 发明授权
    • System and method for enhanced computer telephony integration and interaction
    • 用于增强计算机电话集成和交互的系统和方法
    • US07697506B2
    • 2010-04-13
    • US10651468
    • 2003-08-29
    • Attila NarinJonathan Jay CadizAnoop GuptaMichael BoyleGavin Jancke
    • Attila NarinJonathan Jay CadizAnoop GuptaMichael BoyleGavin Jancke
    • H04L12/66H04L12/56
    • H04M3/42323H04M3/42272H04M3/5125H04M3/5183
    • An enhanced computer telephony integration system that facilitates the interaction and integration of a private branch exchange (PBX) with a client computer on a computer network. An enhanced telephony (ET) server connects to the PBX and to all running instances of an ET client on a user's computers. The ET server acts as a proxy between the ET clients and the PBX. The ET clients register with the ET server for a certain telephone extension. The ET server then can forward telephone action requests (such as placing a telephone call) from the registered ET clients to the PBX servicing the telephone extension. Moreover, the ET server can relay telephone events (such as an incoming call) from the PBX to all registered clients. The ET server facilitates seamless integration of telephone and personal computer features to provide a rich user-controlled computer-telephone integration for a user.
    • 一种增强的计算机电话集成系统,其促进专用小交换机(PBX)与计算机网络上的客户端计算机的交互和集成。 增强型电话(ET)服务器连接到PBX以及用户计算机上ET客户端的所有运行实例。 ET服务器充当ET客户端和PBX之间的代理。 ET客户端向ET服务器注册某个电话分机。 然后,ET服务器可以将来自注册的ET客户端的电话操作请求(例如拨打电话)转发到为电话分机服务的集团电话。 此外,ET服务器可以将电话事件(例如来电)从PBX转发到所有注册的客户端。 ET服务器便于电话和个人计算机功能的无缝集成,为用户提供丰富的用户控制的计算机电话集成。
    • 8. 发明授权
    • Providing configurable pricing for execution of software images
    • 为执行软件图像提供可配置定价
    • US08788379B1
    • 2014-07-22
    • US11963331
    • 2007-12-21
    • Peter SirotaJames Alfred Gordon GreenfieldDon JohnsonAttila Narin
    • Peter SirotaJames Alfred Gordon GreenfieldDon JohnsonAttila Narin
    • G06Q40/00
    • G06Q20/10G06F8/63G06F9/45558G06F21/12G06F2009/45562G06Q20/145G06Q20/3552G06Q30/04G06Q30/06
    • Techniques are described for facilitating sharing of executable software images between users in a configurable manner. In at least some situations, the executable software images are virtual machine images, and while executing may access and use remote network-accessible services (e.g., Web services). In addition, some or all shared executable software images may be made available in a fee-based manner by creator users, such that execution of such a fee-based software image by a software image execution service on behalf of a user other than the creator user is performed in exchange for fees from the other user as specified by the creator user. The creator user may further receive at least some of the specified fees paid by the other user, such as at least some of a difference between the specified fees and fees charged by the software image execution service for the execution.
    • 描述了用于以可配置的方式在用户之间共享可执行软件映像的技术。 在至少一些情况下,可执行软件映像是虚拟机映像,并且在执行时可以访问和使用远程网络可访问服务(例如,Web服务)。 此外,一些或所有共享的可执行软件图像可以由创建者用户以费用方式提供,使得软件图像执行服务代表创建者以外的用户来执行这样的基于费用的软件图像 执行用户以交换由创建者用户指定的其他用户的费用。 创建者用户可以进一步接收由其他用户支付的指定费用中的至少一些,例如由软件图像执行服务为执行而收取的指定费用和费用之间的差异中的至少一些。
    • 9. 发明授权
    • System and method for integrating secure and non-secure software objects
    • 用于集成安全和非安全软件对象的系统和方法
    • US07650493B2
    • 2010-01-19
    • US11357551
    • 2006-02-17
    • Attila Narin
    • Attila Narin
    • H04L9/00
    • G06F21/53
    • A secure first process uses a non-secure software object by hosting said non-secure software object in a separate second process, where the first process's address space is inaccessible to the second process. The first process communicates with the second process, preferably by means of a COM API that the second process exposes to the first process. The application that runs in the second process may expose APIs of the hosted non-secure object to the first process, and the first process may communicate with the non-secure object hosted in the second process through this API. In a preferred embodiment, the second process renders its output in a child window of the first process, so that the use of a second process to host non-secure software objects is transparent to a user of the first process.
    • 安全的第一进程通过在单独的第二进程中托管所述非安全软件对象来使用非安全软件对象,其中第一进程的地址空间不可访问第二进程。 第一进程优选地通过第二进程暴露于第一进程的COM API与第二进程进行通信。 在第二过程中运行的应用程序可以将托管的非安全对象的API公开到第一进程,并且第一进程可以通过该API与第二进程中托管的非安全对象进行通信。 在优选实施例中,第二进程将其输出呈现在第一进程的子窗口中,使得使用第二进程来托管非安全软件对象对于第一进程的用户是透明的。