会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明申请
    • UTILIZING E-MAIL RESPONSE TIME STATISTICS FOR MORE EFFICIENT AND EFFECTIVE USER COMMUNICATION
    • 利用电子邮件响应时间统计更有效和有效的用户沟通
    • US20100250682A1
    • 2010-09-30
    • US12411880
    • 2009-03-26
    • Itzhack GoldbergBruce A. KahnBoaz MizrachiMichael R. O'Brien
    • Itzhack GoldbergBruce A. KahnBoaz MizrachiMichael R. O'Brien
    • G06F15/16
    • G06Q10/107H04L51/34
    • A method of increasing email correspondence responsiveness may include detecting a first set of email messages transmitted by a first correspondent to a second correspondent, creating a tracking record based on the responsiveness of the second correspondent to each email message of the first set of email messages, performing a first statistical analysis of the tracking record, generating a set of responsiveness metrics based on the first statistical analysis, detecting new outgoing email messages addressed to the second correspondent, and providing a user-configurable email message format for each detected outgoing message, the user-configurable email message format. According to the example embodiment, the user-configurable email message format is configured to increase effective email response time from the second correspondent and the user-configurable email message format is based on the set of responsiveness metrics.
    • 增加电子邮件通信响应能力的方法可以包括:检测第一通信对方发送给第二通信对方的第一组电子邮件消息,基于第二通信对第一组电子邮件消息的每个电子邮件消息的响应性来创建跟踪记录, 执行跟踪记录的第一统计分析,基于第一统计分析生成一组响应度量,检测寻址到第二通信对方的新的传出电子邮件消息,以及为每个检测到的传出消息提供用户可配置的电子邮件消息格式, 用户可配置的电子邮件格式。 根据示例实施例,用户可配置电子邮件消息格式被配置为增加来自第二通信对方的有效电子邮件响应时间,并且用户可配置电子邮件消息格式基于响应度量集合。
    • 43. 发明申请
    • USER POLICY MANAGEABLE STRENGTH-BASED PASSWORD AGING
    • 用户策略可管理强度的密码老化
    • US20100031343A1
    • 2010-02-04
    • US12181364
    • 2008-07-29
    • Rhonda L. ChildressItzhack GoldbergMoriel LechtmanYotam Medini
    • Rhonda L. ChildressItzhack GoldbergMoriel LechtmanYotam Medini
    • H04L9/32
    • G06F21/46
    • Password aging based on the strength of the password provides an incentive for users to generate and/or memorize more complex passwords. The strength of the password is computed from a formula that relates the length of the password and the types of characters contained in the password to a strength value, which can be performed using a lookup table having values for different characteristics of the password, determining partial strength values corresponding to the ranges in which the characteristics fall, and then adding the partial strength values. Alternatively, a separate password strength application may be used to provide the strength value, which is entered by the user or administrator generating a new password. Alternatively, the password may be generated based on a specified desired expiration period, with the strength computation performed to ensure that the strength is sufficient to merit the desired expiration period.
    • 基于密码强度的密码老化提供了激励用户生成和/或记住更复杂的密码。 密码的强度根据密码长度和密码中包含的字符类型与强度值相关联的公式计算,该强度值可以使用具有不同密码特征值的查找表来执行,确定部分 强度值对应于特征下降的范围,然后加上部分强度值。 或者,可以使用单独的密码强度应用来提供由用户或管理员输入的生成新密码的强度值。 或者,可以基于指定的期望到期期间来生成密码,其中执行强度计算以确保强度足以使所需期望的期满期满。
    • 45. 发明申请
    • CODE RECOVERY SYSTEM AND METHOD
    • 代码恢复系统和方法
    • US20080201694A1
    • 2008-08-21
    • US11677538
    • 2007-02-21
    • Itzhack GoldbergYotam MediniKenneth NaginShmuel Vashdi
    • Itzhack GoldbergYotam MediniKenneth NaginShmuel Vashdi
    • G06F9/44
    • G06F11/1433G06F8/62G06F11/202
    • A system and method for restoring a computing system to a first operating state associated with a first system software code installed on the computing system is provided. The method comprises installing a second system software code on the computing system, while the system is operating in the first operating state. The second system software code is activated and the first system software code is deactivated to cause the computing system to operate in a second operating state. The first system software code is activated and the second system software code is deactivated to cause the system to return to the first operating state, if activation of the second system software code causes the system to operate in an undesirable manner.
    • 提供了一种用于将计算系统恢复到与安装在计算系统上的第一系统软件代码相关联的第一操作状态的系统和方法。 该方法包括在系统在第一操作状态下操作时在计算系统上安装第二系统软件代码。 第二系统软件代码被激活,并且第一系统软件代码被去激活以使计算系统在第二操作状态下操作。 激活第一系统软件代码并且停用第二系统软件代码以使系统返回到第一操作状态,如果第二系统软件代码的激活导致系统以不期望的方式操作。
    • 48. 发明授权
    • Intelligent file management
    • 智能文件管理
    • US09594762B2
    • 2017-03-14
    • US13345346
    • 2012-01-06
    • Al ChakraItzhack GoldbergJohn Rice
    • Al ChakraItzhack GoldbergJohn Rice
    • G06F12/00G06F17/30G06F11/30
    • G06F17/30115G06F11/3089G06F2201/865
    • In one example, an indication is detected that an application has performed a file operation on a file and a computing system determines whether a datastore includes an association between an application identifier that identifies the application and a file identifier that identifies the file. If not, the association between the application identifier and the file identifier is stored. A computing system also determines whether execution behavior of the application changes when the file is not accessible to the application. Responsive to a change in execution behavior of the application, a status indicator is associated with the file identifier to indicate that the execution behavior of the application changes when the file is not accessible to the application.
    • 在一个示例中,检测到应用已经对文件执行文件操作的指示,并且计算系统确定数据存储是否包括标识应用的应用标识符与标识该文件的文件标识符之间的关联。 如果不是,则存储应用标识符与文件标识符之间的关联。 计算系统还确定应用程序在文件不可访问时应用程序的执行行为是否发生变化。 响应于应用程序的执行行为发生变化,状态指示器与文件标识符相关联,以指示当应用程序无法访问该文件时,该应用程序的执行行为会发生更改。
    • 50. 发明授权
    • Method and system for text-to-speech synthesis with personalized voice
    • 用于个性化语音的文本到语音合成的方法和系统
    • US08886537B2
    • 2014-11-11
    • US11688264
    • 2007-03-20
    • Itzhack GoldbergRon HooryBoaz MizrachiZvi Kons
    • Itzhack GoldbergRon HooryBoaz MizrachiZvi Kons
    • G10L13/00G10L13/033G10L13/04
    • G10L13/00G10L13/033G10L13/04
    • A method and system are provided for text-to-speech synthesis with personalized voice. The method includes receiving an incidental audio input (403) of speech in the form of an audio communication from an input speaker (401) and generating a voice dataset (404) for the input speaker (401). The method includes receiving a text input (411) at the same device as the audio input (403) and synthesizing (312) the text from the text input (411) to synthesized speech including using the voice dataset (404) to personalize the synthesized speech to sound like the input speaker (401). In addition, the method includes analyzing (316) the text for expression and adding the expression (315) to the synthesized speech. The audio communication may be part of a video communication (453) and the audio input (403) may have an associated visual input (455) of an image of the input speaker. The synthesis from text may include providing a synthesized image personalized to look like the image of the input speaker with expressions added from the visual input (455).
    • 提供了一种用于具有个性化语音的文本到语音合成的方法和系统。 该方法包括从输入扬声器(401)接收音频通信形式的语音的附带音频输入(403),并产生用于输入扬声器(401)的语音数据集(404)。 该方法包括在与音频输入(403)相同的设备处接收文本输入(411),并将来自文本输入(411)的文本合成(312)到包括使用语音数据集(404)的合成语音,以个性化合成的 语音类似于输入扬声器(401)。 此外,该方法包括分析(316)表达的文本并将表达式(315)添加到合成语音。 音频通信可以是视频通信的一部分(453),并且音频输入(403)可以具有输入说话者的图像的相关视觉输入(455)。 来自文本的合成可以包括提供个性化的看起来像输入说话者的图像的合成图像,其中从视觉输入(455)添加表达。