会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Method for non-disruptively associating applications and middleware components with information technology infrastructure
    • 应用程序和中间件组件与信息技术基础架构无中断关联的方法
    • US07945613B2
    • 2011-05-17
    • US11950957
    • 2007-12-05
    • Murthy V. DevarakondaNikolai JoukovHui LeiKonstantinos MagoutisNorbert G. Vogl
    • Murthy V. DevarakondaNikolai JoukovHui LeiKonstantinos MagoutisNorbert G. Vogl
    • G06F15/16
    • G06Q10/04
    • A methodology is presented for discovering and storing end-to-end associations between different types of entities in a system configuration model of a distributed middleware system. First associations are determined, at each distributed system tier, between instances of data and data-container configuration elements. Those first associations point to logical subdivision of a data service that is directly responsible for implementing an instance of data. Second associations are determined, at said each distributed system tier, between said data-container configuration elements and a server infrastructure. Said second associations point to a server infrastructure that hosts said data-container configuration elements. Third associations are composed, within said each distributed system tier, between said instances of data and said server infrastructure, using said first associations and said second associations. Fourth associations are composed, end-to-end, which represent dependency of an application using said instances of data to said server infrastructure.
    • 提出了一种在分布式中间件系统的系统配置模型中发现和存储不同类型实体之间的端到端关联的方法。 在每个分布式系统层,确定数据和数据容器配置元素的实例之间的第一个关联。 那些第一个关联指向直接负责实现数据实例的数据服务的逻辑细分。 在所述每个分布式系统层处,在所述数据容器配置元件和服务器基础设施之间确定第二关联。 所述第二关联指向承载所述数据容器配置元素的服务器基础设施。 在所述每个分布式系统层内,使用所述第一关联和所述第二关联,在所述数据实例与所述服务器基础设施之间组成第三关联。 第四个关联由端到端组成,它们表示使用所述服务器基础设施的所述数据实例的应用的依赖性。
    • 43. 发明授权
    • Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security
    • 用于提供射频识别(RFID)安全性的相互认证的方法,系统和计算机程序产品
    • US07791451B2
    • 2010-09-07
    • US11550091
    • 2006-10-17
    • Hui LeiJenny S. Li
    • Hui LeiJenny S. Li
    • G06K19/00H04L9/14H04L9/32
    • H04L63/0869H04L9/3273H04L63/0492H04L2209/805
    • Methods, systems and computer program products for providing mutual authentication for radio frequency identification (RFID) security. Methods include receiving an authentication request at a RFID tag from a requester, where the request includes an encrypted access role. An encrypted secret message is transmitted to the requestor in response to receiving the authentication request. The encrypted secret message is based on the encrypted access role received from the requester. An access request specifying a work area and including a random number that is encrypted is received from the requester at the RFID tag. The access request was generated by the requester in response to the RFID tag being successfully authenticated by the requestor using the encrypted secret message. The requester is authenticated at the RFID tag. The authenticating includes determining the value of the random number sent by the requester and verifying that the work area is valid for the encrypted access role. If the authenticating is successful, the RFID tag responds to the access request using the value of the random number as an encryption key.
    • 用于提供射频识别(RFID)安全性的相互认证的方法,系统和计算机程序产品。 方法包括在来自请求者的RFID标签处接收认证请求,其中请求包括加密的访问角色。 响应于接收到认证请求,将加密的秘密消息发送到请求者。 加密的秘密消息基于从请求者接收的加密访问角色。 从RFID标签的请求者接收指定工作区域并包括加密的随机数的访问请求。 响应于使用加密的秘密消息的请求者成功认证的RFID标签,请求者产生访问请求。 请求者在RFID标签上进行身份验证。 认证包括确定请求者发送的随机数的值并验证工作区对于加密访问角色是否有效。 如果认证成功,则RFID标签使用随机数的值作为加密密钥来响应接入请求。
    • 44. 发明申请
    • COMPUTER-ASSISTED INFORMATION TECHNOLOGY SERVICE DESIGN SYSTEM
    • 计算机辅助信息技术服务设计系统
    • US20090012800A1
    • 2009-01-08
    • US11773985
    • 2007-07-06
    • Murthy V. DevarakondaHui LeiSoumitra SarkarAxel Tanner
    • Murthy V. DevarakondaHui LeiSoumitra SarkarAxel Tanner
    • G06Q30/00
    • G06F8/36G06F8/24G06F8/34G06Q10/103
    • A method and system are disclosed for providing automated assistance to a service provider for creating a technical solution definition for a project for delivering Information Technology (IT) outsourcing services for a customer. The method comprises the steps of providing, in machine processable form, a definition of a taxonomy of a set of standard services offered by the service provider; providing, in machine processable form, a repository of service designs, each of the service designs describing a set of IT architecture components to deliver a service associated with a standard service element, according to a specified best practice rule; and providing, in machine processable form, a collection of policies that can be executed to validate the service designs selected to deliver the set of contracted services. A computer implemented design tool is used to define the scope of a project a set of service designs, and to run policy-based validation checks on the design.
    • 公开了一种方法和系统,用于向服务提供商提供自动化帮助,以为用于为客户提供信息技术(IT)外包服务的项目创建技术解决方案定义。 该方法包括以机器可处理的形式提供由服务提供商提供的一组标准服务的分类的定义的步骤; 以机器可处理的形式提供服务设计库,每个服务设计描述一组IT架构组件,以根据指定的最佳实践规则提供与标准服务元素相关联的服务; 并且以机器可处理的形式提供可以被执行以验证所选择的服务设计以递送该组合同服务的一组策略。 使用计算机实现的设计工具来定义项目的范围一套服务设计,并在设计上运行基于策略的验证检查。