会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method for associating individuals or email groups with a specific recipient field
    • 将个人或电子邮件组与特定收件人字段相关联的方法
    • US07552185B1
    • 2009-06-23
    • US12180742
    • 2008-07-28
    • Eli KirznerItzhack GoldbergYotam MediniBoaz Mizrachi
    • Eli KirznerItzhack GoldbergYotam MediniBoaz Mizrachi
    • G06F15/16G06F3/00
    • G06Q10/107
    • A method of managing the entry of individuals or email groups into their intended recipient field within a sender's email is disclosed. A predefined, static association between an intended recipient or email group and a To, CC, or BCC recipient field may be created by a sender. A new email message graphical user interface having General, To, CC, and BCC fields contained within the header is provided. When an individual or group is entered into the General recipient field it is automatically delegated to the To, CC, or BCC field with which it is associated. Provisions for ensuring that recipients with multiple field associations do not exist, that recipients with a predefined association are not entered into an incorrect field, for creating a predefined association with two recipient fields, and for creating a predefined association when none exists are also provided.
    • 公开了一种在发送者的电子邮件中管理个人或电子邮件组进入其预期收件人字段的方法。 预期的收件人或电子邮件组与To,CC或BCC收件人字段之间的预定义静态关联可以由发件人创建。 提供了包含在标题内的包含General,To,CC和BCC字段的新的电子邮件消息图形用户界面。 当个人或组被输入到常规收件人字段中时,它被自动委托给与其相关联的To,CC或BCC字段。 确保不存在具有多个字段关联的收件人的规定,具有预定义关联的收件人未输入到不正确的字段中,用于创建与两个收件人字段的预定义关联以及在不存在时创建预定义关联。
    • 3. 发明授权
    • Code recovery system and method
    • 代码恢复系统和方法
    • US07783921B2
    • 2010-08-24
    • US11677538
    • 2007-02-21
    • Itzhack GoldbergYotam MediniKenneth NaginShmuel Vashdi
    • Itzhack GoldbergYotam MediniKenneth NaginShmuel Vashdi
    • G06F11/00
    • G06F11/1433G06F8/62G06F11/202
    • A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
    • 提供了一种用于将计算系统恢复到与安装在计算系统上的第一系统软件代码相关联的第一操作状态的系统和方法。 该方法包括在系统在第一操作状态下操作时在计算系统上安装第二系统软件代码。 第二系统软件代码被激活,并且第一系统软件代码被去激活以使计算系统在第二操作状态下操作。 激活第一系统软件代码并且停用第二系统软件代码以使系统返回到第一操作状态,如果第二系统软件代码的激活导致系统以不期望的方式操作。
    • 5. 发明授权
    • Call connection system and method
    • 呼叫连接系统和方法
    • US08948353B2
    • 2015-02-03
    • US11761383
    • 2007-06-12
    • Itzhack GoldbergSamuel KallnerYotam MediniKenneth Nagin
    • Itzhack GoldbergSamuel KallnerYotam MediniKenneth Nagin
    • H04M11/00H04M1/2745
    • H04M1/274516
    • A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
    • 一种用于在第一通信设备和第二通信设备之间建立通信连接的方法,所述方法包括在第一通信设备和第三通信设备之间建立的第一通信连接期间请求第二通信设备的联系人信息; 响应于在第一通信连接期间与第三通信设备交互的第三方,从第三通信设备接收联系人信息; 以及基于从第三通信设备接收的联系信息,在第一通信设备和第二通信设备之间建立第二通信连接,其中通过第一通信设备建立第二通信连接,独立地启动与第二通信设备的通信 。
    • 6. 发明申请
    • CALL CONNECTION SYSTEM & METHOD
    • 呼叫连接系统与方法
    • US20080310605A1
    • 2008-12-18
    • US11761383
    • 2007-06-12
    • Itzhack GoldbergSamuel KallnerYotam MediniKenneth Nagin
    • Itzhack GoldbergSamuel KallnerYotam MediniKenneth Nagin
    • H04M11/00
    • H04M1/274516
    • A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
    • 一种用于在第一通信设备和第二通信设备之间建立通信连接的方法,所述方法包括在第一通信设备和第三通信设备之间建立的第一通信连接期间请求第二通信设备的联系人信息; 响应于在第一通信连接期间与第三通信设备交互的第三方,从第三通信设备接收联系人信息; 以及基于从第三通信设备接收的联系信息,在第一通信设备和第二通信设备之间建立第二通信连接,其中通过第一通信设备建立第二通信连接,独立地启动与第二通信设备的通信 。
    • 7. 发明申请
    • CODE RECOVERY SYSTEM AND METHOD
    • 代码恢复系统和方法
    • US20080201694A1
    • 2008-08-21
    • US11677538
    • 2007-02-21
    • Itzhack GoldbergYotam MediniKenneth NaginShmuel Vashdi
    • Itzhack GoldbergYotam MediniKenneth NaginShmuel Vashdi
    • G06F9/44
    • G06F11/1433G06F8/62G06F11/202
    • A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
    • 提供了一种用于将计算系统恢复到与安装在计算系统上的第一系统软件代码相关联的第一操作状态的系统和方法。 该方法包括在系统在第一操作状态下操作时在计算系统上安装第二系统软件代码。 第二系统软件代码被激活,并且第一系统软件代码被去激活以使计算系统在第二操作状态下操作。 激活第一系统软件代码并且停用第二系统软件代码以使系统返回到第一操作状态,如果第二系统软件代码的激活导致系统以不期望的方式操作。
    • 9. 发明授权
    • User policy manageable strength-based password aging
    • 用户策略可管理基于强度的密码老化
    • US08370925B2
    • 2013-02-05
    • US12181364
    • 2008-07-29
    • Rhonda L. ChildressItzhack GoldbergMoriel LechtmanYotam Medini
    • Rhonda L. ChildressItzhack GoldbergMoriel LechtmanYotam Medini
    • G06F7/04G06F12/00G06F12/14G06F13/00G06F17/30G11C7/00
    • G06F21/46
    • Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
    • 基于密码强度的密码老化提供了激励用户生成和/或记住更复杂的密码。 密码的强度根据密码长度和密码中包含的字符类型与强度值相关联的公式计算,该强度值可以使用具有不同密码特征值的查找表来执行,确定部分 强度值对应于特征下降的范围,然后加上部分强度值。 或者,可以使用单独的密码强度应用来提供由用户或管理员输入的生成新密码的强度值。 或者,可以基于指定的期望到期期间来生成密码,其中执行强度计算以确保强度足以使所需期望的期满期满。