会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • System configuration proposal method and tool therefor
    • 系统配置提案方法及其工具
    • US06347303B2
    • 2002-02-12
    • US09164579
    • 1998-10-01
    • Yasuhiko NagaiYoshiyuki NakayamaSusumu Matsui
    • Yasuhiko NagaiYoshiyuki NakayamaSusumu Matsui
    • B65G5716
    • G06Q10/06G06Q10/0631G06Q10/06311G06Q10/063112
    • A system configuration evaluation/proposal support method of supporting the effect evaluation of a support system for enhancing the business processing ability of a human and a system configuration proposal suitable to a business process, and a tool for the method are provided in the following manner. Data of a functional process model expressing a business process on a basic function element unit of information processing, a system configuration candidate constructed by a combination of an information system resource and a human resource, the degree of relationship between a functional process item and a related functional item provided by the system configuration candidate, the degree of importance of the functional process item, the degree of functional sufficiency of the provided functional item, and the degree of relationship of both items is defined. An operation for evaluating the functional support suitability of the system configuration candidate is executed by a mapping function calculation. A suitability analysis process, an analysis/evaluation result display process, and proposed system updating determination are performed.
    • 以下列方式提供支持用于增强人的业务处理能力的支持系统的效果评估的系统配置评估/提议支持方法和适合于业务流程的系统配置提议,以及用于该方法的工具。 表示基于信息处理的基本功能单元单元的业务流程的功能过程模型的数据,由信息系统资源和人力资源的组合构成的系统配置候选者,功能处理项目和相关的功能过程项目之间的关系程度 定义了由系统配置候选提供的功能项目,功能处理项目的重要程度,所提供的功能项目的功能充足程度以及两个项目的关系程度。 通过映射函数计算来执行用于评估系统配置候选的功能支持适合性的操作。 执行适用性分析处理,分析/评价结果显示处理以及提出的系统更新判定。
    • 5. 发明授权
    • Information security policy evaluation system and method of controlling the same
    • 信息安全政策评估体系及其控制方法
    • US07415728B2
    • 2008-08-19
    • US10817054
    • 2004-04-02
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • G06Q40/00G06F15/18
    • H04L63/0227G06Q40/08
    • In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site are transmitted from a second information processing apparatus on the second site to a first information processing apparatus on a first site, threat information is transmitted from a third site collecting information on threats to the first information processing apparatus on the first site. The first information processing apparatus extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.
    • 为了提供信息安全策略评估系统,其中可以在诸如公司的组织中有效且适当地定义和操作信息安全策略,在第二站点上从第二信息处理设备发送在第二站点上操作的处理的威胁 站点到第一站点上的第一信息处理设备,在第一站点上从第三站点收集关于对第一信息处理设备的威胁的信息的威胁信息。 第一信息处理设备提取对已经发生的威胁已经有效的处理的威胁以及未被处理的威胁,并且生成其中描述了这些威胁的评估报告。 此外,根据所产生的评估报告,更改对威胁的赔偿额。
    • 7. 发明申请
    • Information security policy evaluation system and method of controlling the same
    • 信息安全政策评估体系及其控制方法
    • US20050076243A1
    • 2005-04-07
    • US10817054
    • 2004-04-02
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • Masayuki MorohashiYasuhiko NagaiRitsuko Aiba
    • G06Q10/06G06Q10/00G06Q50/00H04L9/00H04L9/32H04L29/06
    • H04L63/0227G06Q40/08
    • In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site 102 are transmitted from a second information processing apparatus 112 on the second site 102 to a first information processing apparatus 111 on a first site 101, threat information is transmitted from a third site 103 collecting information on threats to the first information processing apparatus 111 on the first site 101. The first information processing apparatus 111 extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.
    • 为了提供一种信息安全策略评估系统,其中可以在诸如公司的组织中有效地适当地定义和操作信息安全策略,在第二站点102处操作的处理的威胁从第二信息处理设备112发送到 将第二站点102发送到第一站点101上的第一信息处理设备111,从第一站点101上的第一信息处理设备111的收集关于威胁的信息的第三站点103发送威胁信息。第一信息处理设备111提取 对已经发生的威胁进行有效的威胁,以及未经处理的威胁,不受处理的威胁,并产生一个评估报告。 此外,根据所产生的评估报告,更改对威胁的赔偿额。
    • 8. 发明授权
    • Information reception processing method and computer-telephony integration system
    • 信息接收处理方法和计算机电话集成系统
    • US06636587B1
    • 2003-10-21
    • US09103816
    • 1998-06-24
    • Yasuhiko NagaiSusumu Matsui
    • Yasuhiko NagaiSusumu Matsui
    • H04M1100
    • H04M3/5307H04L51/066H04L51/36H04M3/42323H04M3/5335H04M2201/60H04M2203/4509H04M2207/20
    • When a sender sends a transmission message to a receiver by use of a communication appliance such as telephone, portable telephone, facsimile or electronic mail, the transmission massage is temporarily received by a computer-telephony integration (CTI) server. The CTI server makes reference to a user contact table to thereby specify a contact point of the receiver at present and the kind of a communication appliance capable of being used by the receiver which are registered in advance in the user contact table. Then, the CTI server sends the transmission message to the receiver after automatic media conversion in accordance with the communication appliance and reception condition which are allowed for the receiver to use. A reception condition requested by the sender may be reflected in a part of the reception condition of the receiver.
    • 当发送者通过使用诸如电话,便携式电话,传真或电子邮件的通信设备向接收者发送传输消息时,传输按摩被计算机电话集成(CTI)服务器临时接收。 CTI服务器引用用户接触表,从而指定目前接收机的接触点和能够由接收机使用的通信设备的类型,该接收机预先登录在用户接触表中。 然后,CTI服务器根据允许接收机使用的通信设备和接收条件在自动媒体转换之后将发送消息发送到接收者。 发送者请求的接收条件可以反映在接收机的接收状态的一部分中。