会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Augmented and cross-service tagging
    • 增强和跨服务标签
    • US08914368B2
    • 2014-12-16
    • US12752016
    • 2010-03-31
    • Hernan BadenesJulian Ariel CerrutiStephen Michael DillJulia Haven GraceNicolas LanaroJerald Thomas SchoudtJohn C TangEric Wilcox
    • Hernan BadenesJulian Ariel CerrutiStephen Michael DillJulia Haven GraceNicolas LanaroJerald Thomas SchoudtJohn C TangEric Wilcox
    • G06F17/30G06F7/00
    • G06F17/30876G06F17/30011G06F17/30731G06F17/30734G06F17/30896
    • According to one embodiment of the present invention, a method for cross-service tagging is provided. The method includes creating connections to multiple applications, each application having multiple entities. Relationships are determined between the entities within a single application and between entities across multiple applications. A tag is associated with a selected one of the entities in a first one of the multiple applications. Entities in other applications besides the first application are identified that are related to the selected entity, based on the determined relationships. The tag is propagated across multiple applications by associating the tag with the identified entities in the other applications. According to a second embodiment of the present invention, a method for inferring tags suggestions is provided. This method includes analyzing email messages to create keywords from text analysis, from bringing content and tags from other email messages or directory applications. Tags suggestions from the various sources are merged and weighed according to an algorithm.
    • 根据本发明的一个实施例,提供了一种用于跨服务标签的方法。 该方法包括创建到多个应用程序的连接,每个应用程序具有多个实体。 在单个应用程序中的实体之间以及跨多个应用程序的实体之间确定关系。 标签与多个应用中的第一个中的所选择的一个实体相关联。 基于所确定的关系,识别与所选择的实体相关的除了第一应用之外的其他应用中的实体。 标签通过将标签与其他应用程序中标识的实体相关联,跨越多个应用程序进行传播。 根据本发明的第二实施例,提供了一种用于推断标签建议的方法。 这种方法包括分析电子邮件,从文本分析中创建关键字,从内容和其他电子邮件或目录应用程序的标签。 根据算法合并和权衡来自各种来源的标签建议。
    • 5. 发明申请
    • PROVIDING CONSISTENT CRYPTOGRAPHIC OPERATIONS
    • 提供一致的拼图操作
    • US20130097432A1
    • 2013-04-18
    • US13272797
    • 2011-10-13
    • Julian Ariel CerrutiMariela Claudia LanzaGuillermo ManzatoMariano Alejandro PredilettoJames J. Whitmore
    • Julian Ariel CerrutiMariela Claudia LanzaGuillermo ManzatoMariano Alejandro PredilettoJames J. Whitmore
    • G06F12/14
    • G06F21/602H04L9/14
    • A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in executing in the data processing system. A security schema object is received by the security plug-in, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components each component describing an aspect of the cryptographic operations. The data input is transformed into a secure structured data object by the security plug-in using the sequence of cryptographic operations. A property of the secure structured data object is populated using data about the security schema object. The secure structured data object is transmitted to a consumer application.
    • 在说明性实施例中提供了用于在使用受保护的结构化数据对象的数据处理环境中提供一致密码操作的方法,系统和计算机可用程序产品。 由数据处理系统中执行的应用程序和安全插件的安全插件从始发应用程序接收数据输入。 安全性插件接收安全模式对象,安全模式对象描述一系列加密操作,其中安全模式对象包括描述密码操作方面的多个组件的每个组件。 使用密码操作的顺序,数据输入由安全插件转换成安全的结构化数据对象。 使用有关安全模式对象的数据填充安全结构化数据对象的属性。 安全的结构化数据对象被传送到消费者应用程序。
    • 8. 发明授权
    • Providing consistent cryptographic operations
    • 提供一致的加密操作
    • US09009472B2
    • 2015-04-14
    • US13272797
    • 2011-10-13
    • Julian Ariel CerrutiMariela Claudia LanzaGuillermo ManzatoMariano Alejandro PredilettoJames J. Whitmore
    • Julian Ariel CerrutiMariela Claudia LanzaGuillermo ManzatoMariano Alejandro PredilettoJames J. Whitmore
    • H04L29/06G06F21/60H04L9/14
    • G06F21/602H04L9/14
    • A method, system, and computer usable program product for providing consistent cryptographic operations in a data processing environment using protected structured data objects are provided in the illustrative embodiments. A data input is received from an originating application by a security plug-in, both the application and the security plug-in executing in the data processing system. A security schema object is received by the security plug-in, the security schema object describing a sequence of cryptographic operations, wherein the security schema object includes a plurality of components each component describing an aspect of the cryptographic operations. The data input is transformed into a secure structured data object by the security plug-in using the sequence of cryptographic operations. A property of the secure structured data object is populated using data about the security schema object. The secure structured data object is transmitted to a consumer application.
    • 在说明性实施例中提供了用于在使用受保护的结构化数据对象的数据处理环境中提供一致密码操作的方法,系统和计算机可用程序产品。 由数据处理系统中执行的应用程序和安全插件的安全插件从始发应用程序接收数据输入。 安全性插件接收安全模式对象,安全模式对象描述一系列加密操作,其中安全模式对象包括描述密码操作方面的多个组件的每个组件。 使用密码操作的顺序,数据输入由安全插件转换成安全的结构化数据对象。 使用有关安全模式对象的数据填充安全结构化数据对象的属性。 安全的结构化数据对象被传送到消费者应用程序。