会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Web page based program versioning
    • 基于网页的程序版本控制
    • US08887039B2
    • 2014-11-11
    • US11968624
    • 2008-01-02
    • Zhenbin XuAlex MogilevskyMarkus W. Mielke
    • Zhenbin XuAlex MogilevskyMarkus W. Mielke
    • G06F3/00G06F17/30
    • G06F17/30905
    • An identification of one of multiple types of Web browsers that a Web page supports, as well as an identification of one of multiple versions of that one type of Web browser that the Web page supports, is obtained. The Web page is displayed using the identified version of the identified Web browser type. A request for an identification of the identified version of the identified Web browser type can also be received from a program, such as a Web page script. In response to the request, an identification of the identified version of the identified Web browser type is being used to display the Web page is returned, and instructions of the program are executed based at least in part on the identified version of the identified Web browser type.
    • 获得网页支持的多种类型的Web浏览器之一的标识,以及Web页面支持的该类型的Web浏览器的多个版本之一的标识。 使用识别的Web浏览器类型的标识版本显示网页。 还可以从诸如网页脚本的程序接收对所识别的所述Web浏览器类型的识别版本的标识的请求。 响应于该请求,正在使用所标识的Web浏览器类型的识别版本的标识来显示返回的网页,并且至少部分地基于所识别的Web浏览器的标识版本来执行该程序的指令 类型。
    • 8. 发明申请
    • Strategies for Controlling Use of a Resource that is Shared Between Trusted and Untrusted Environments
    • 控制在可信任和不受信任的环境之间共享的资源的使用策略
    • US20080256601A1
    • 2008-10-16
    • US11733317
    • 2007-04-10
    • Sunava DuttaZhenbin Xu
    • Sunava DuttaZhenbin Xu
    • G06F7/04
    • H04L63/10G06F21/554G06F21/6209G06F2221/2147H04L63/168H04L63/20
    • A strategy is described for controlling access to a resource which is shared between a trusted environment and an untrusted environment. The resource can represent a clipboard module. The trusted environment can include trusted client functionality, while the untrusted environment can include potentially untrusted network-accessible entities (e.g., websites) which seek to access the clipboard module. The strategy provides a security presentation which notifies a user when a network-accessible entity is attempting to access the clipboard module, identifying the entity which is making the attempt, together with the nature of the information being read or added to the clipboard module. The security presentation invites the user to approve or deny the particular attempt (or all such attempts from the network-accessible entity), and/or clear the clipboard module. The security presentation does not block the user's interaction with other parts of a user interface presentation.
    • 描述了一种策略,用于控制对可信环境和不受信任环境之间共享的资源的访问。 资源可以表示剪贴板模块。 可信环境可以包括受信任的客户端功能,而不可信环境可以包括寻求访问剪贴板模块的潜在不可信网络可访问实体(例如,网站)。 该策略提供了一种安全性呈现,当网络可访问实体试图访问剪贴板模块时,通知用户,识别正在进行尝试的实体,以及正在读取或添加到剪贴板模块的信息的性质。 安全演示邀请用户批准或拒绝特定尝试(或来自网络可访问实体的所有此类尝试)和/或清除剪贴板模块。 安全演示不会阻止用户与用户界面演示的其他部分的交互。
    • 9. 发明授权
    • Search authoring metrics and debugging
    • 搜索创作指标和调试
    • US07783657B2
    • 2010-08-24
    • US11144268
    • 2005-06-03
    • Steven FoxZhenbin XuZijian Zheng
    • Steven FoxZhenbin XuZijian Zheng
    • G06F7/00G06F17/30
    • G06F17/30595
    • A search authoring tool for mapping queries to assets for use in an information retrieval system has a query-to-asset mappings database, a search authoring engine, and a search evaluation engine. The query-to-asset mappings database is built from search author input and user mappings. The search authoring engine is adapted to receive operator input and to generate one or more new query-to-asset mappings based on the received operator input. The search evaluation engine is adapted to compare the one or more new query-to-asset mappings to the existing mappings to determine if the one or more new query-to-asset mappings will cause performance degradation of the information retrieval system.
    • 用于将查询映射到用于信息检索系统的资产的搜索创作工具具有查询到资产映射数据库,搜索创作引擎和搜索评估引擎。 查询到资产映射数据库是从搜索作者输入和用户映射构建的。 搜索创作引擎适于接收操作员输入并且基于接收的操作者输入生成一个或多个新的查询到资产映射。 搜索评估引擎适于将一个或多个新的查询到资产映射与现有映射进行比较,以确定一个或多个新的查询到资产映射是否将导致信息检索系统的性能下降。
    • 10. 发明申请
    • SINGLE-ROUNDTRIP EXCHANGE FOR CROSS-DOMAIN DATA ACCESS
    • 用于跨域数据访问的单环交换
    • US20090132713A1
    • 2009-05-21
    • US11942734
    • 2007-11-20
    • Sunava DuttaZhenbin Xu
    • Sunava DuttaZhenbin Xu
    • G06F15/16
    • H04L67/02G06F16/958
    • An anonymous cross-domain data request message is sent to a target domain, the request message including a cross-domain data request header. A cross-domain response message is also received from the target domain if cross-domain data requests are supported by the computing device and if the data requested by the anonymous cross-domain data request message is available for cross-domain data requests. The cross-domain response message includes a cross-domain request allowed header as well as the data requested by the anonymous cross-domain data request message. The requested data can be thoroughly examined, without restriction, by a Web page initiating the request. The target domain is a different domain than the domain that includes a Web page that requested that the anonymous cross-domain data request message be sent.
    • 将匿名跨域数据请求消息发送到目标域,该请求消息包括跨域数据请求报头。 如果计算设备支持跨域数据请求,并且匿名跨域数据请求消息请求的数据是否可用于跨域数据请求,则还从目标域接收到跨域响应消息。 跨域响应消息包括跨域请求允许头部以及由匿名跨域数据请求消息请求的数据。 所请求的数据可以通过启动请求的网页进行彻底检查,而不受限制。 目标域是与包含请求发送匿名跨域数据请求消息的网页的域不同的域。