会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 74. 发明授权
    • Autonomic service routing using observed resource requirement for self-optimization
    • 使用观察资源需求进行自我优化的自动服务路由
    • US07461166B2
    • 2008-12-02
    • US10370837
    • 2003-02-21
    • Ronald P. DoyleDavid Louis Kaminsky
    • Ronald P. DoyleDavid Louis Kaminsky
    • G06F15/173
    • G06F9/5055
    • A method for routing service requests to service instances in a service providing infrastructure is disclosed. A service request is received. Computing resource vectots for at least two service hosts are computed, and each of the service hosts have a corresponding service providing infrastructure. A resource model for the service request is retrieved. The retrieved resource model are matched to each of the resource vectors to identify a best-fit resource vector. The service request is routed to a selected service host associated with the identified best-fit resource vector. Processing of received service requests is monitored. Individual resource components in the service hosts which are consumed during the processing are identified. Resource models for the service requests are produced based upon the identified individual resource components in the service hosts. A time series model is computed for each of the service requests based upon the identified individual resource components.
    • 公开了一种将服​​务请求路由到服务提供基础设施中的服务实例的方法。 接收到服务请求。 计算至少两个服务主机的计算资源向量,并且每个服务主机都具有相应的服务提供基础架构。 检索服务请求的资源模型。 检索到的资源模型与每个资源向量相匹配,以识别最佳拟合资源向量。 服务请求被路由到与所识别的最佳拟合资源向量相关联的所选择的服务主机。 监视接收到的服务请求的处理。 识别在处理期间消耗的服务主机中的各个资源组件。 服务请求的资源模型基于服务主机中标识的各个资源组件生成。 基于所识别的各个资源组件,为每个服务请求计算时间序列模型。
    • 75. 发明申请
    • Using Biometrics on Pervasive Devices for Mobile Identification
    • 在普及设备上使用生物识别技术进行移动识别
    • US20080212848A1
    • 2008-09-04
    • US12046131
    • 2008-03-11
    • Ronald P. Doyle
    • Ronald P. Doyle
    • G06K9/00
    • G07C9/00158
    • A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost.
    • 一种方法,系统和计算机程序产品,用于在普及设备上使用生物特征来进行移动识别。 现有技术的生物测定装置附着于或并入普及装置内。 然后,该增强的普及设备可用于从任意位置的任意第三方捕获生物特征信息。 分析捕获的信息以确定特定应用所需的第三方的识别,访问权限等。 该解决方案利用了普及设备的便携性和功能性以及其内置的通信能力,以相对较低的成本提供极其灵活,强大的生物识别技术。
    • 76. 发明授权
    • Using biometrics on pervasive devices for mobile identification
    • 在普及设备上使用生物特征进行移动识别
    • US07412604B1
    • 2008-08-12
    • US09537068
    • 2000-03-28
    • Ronald P. Doyle
    • Ronald P. Doyle
    • H04L29/00
    • G07C9/00158
    • A method, system, and computer program product for using biometrics on pervasive devices for purposes of mobile identification. A biometric device of the prior art is attached to, or incorporated within, a pervasive device. This augmented pervasive device may then be used for capturing biometric information from an arbitrary third party in an arbitrary location. The captured information is analyzed to determine the third party's identification, access rights, etc. as needed by a particular application. This solution capitalizes on the portability and functionality of the pervasive device, as well as its built-in communication capability, to provide an extremely flexible, powerful biometric identification technique at relatively low cost.
    • 一种方法,系统和计算机程序产品,用于在普及设备上使用生物特征来进行移动识别。 现有技术的生物测定装置附着于或并入普及装置内。 然后,该增强的普及设备可用于从任意位置的任意第三方捕获生物特征信息。 分析捕获的信息以确定特定应用所需的第三方的识别,访问权限等。 该解决方案利用了普及设备的便携性和功能性以及其内置的通信能力,以相对较低的成本提供极其灵活,强大的生物识别技术。
    • 77. 发明申请
    • METHOD AND SYSTEM TO DETECT APPLICATION NON-CONFORMANCE
    • 检测应用不合格的方法和系统
    • US20080125878A1
    • 2008-05-29
    • US11466610
    • 2006-08-23
    • Ronald P. DoyleDavid L. Kaminsky
    • Ronald P. DoyleDavid L. Kaminsky
    • G05B13/04
    • G06F11/008
    • A method to anticipate and prevent application non-conformance is disclosed. The method includes making available a configuration management database (CMDB) having configuration information of a plurality of system resources and dependency information of a plurality of applications related to the plurality of system resources. The method also includes making available a plurality of rules to establish a plurality of operating conditions that are statistically probable to cause a non-conformance of each system resource of the plurality of system resources, and combining each rule with the CMDB to determine the dependency of each application upon each operating condition. The method proceeds with performing a response action in response to determining that any of the operating conditions are such to cause a statistically probable non-conformance of any of the plurality of applications.
    • 公开了一种预测和防止应用不符合的方法。 该方法包括提供具有多个系统资源的配置信息和与多个系统资源相关的多个应用的​​依赖关系信息的配置管理数据库(CMDB)。 该方法还包括提供多个规则以建立统计上可能导致多个系统资源中的每个系统资源不一致的多个操作条件,并且将每个规则与CMDB组合以确定依赖性 每个应用程序在每个操作条件下。 该方法继续执行响应动作以响应于确定任何操作条件使得多个应用程序中的任何一个的统计上可能的不符合。
    • 78. 发明授权
    • Autonomic failover of grid-based services
    • 基于网格的业务的自动故障转移
    • US07287179B2
    • 2007-10-23
    • US10438434
    • 2003-05-15
    • Ronald P. DoyleDavid Louis Kaminsky
    • Ronald P. DoyleDavid Louis Kaminsky
    • G06F11/00
    • G06F11/203G06F11/2035G06F11/3495H04L67/1002H04L67/1008H04L67/1012H04L67/1034H04L69/40
    • A grid coordinator which has been configured for autonomic failover can include a monitor communicatively linked to a multiplicity of grid hosts in a services grid. A metrics store can be coupled to the monitor and configured to store service metrics for individual service instances in the grid hosts. Optimization logic can be programmed to compute a best-fit between metrics stored for a set of service instances in a failed grid host, and platform metrics determined for a proposed replacement grid host. Finally, a failover processor can be coupled to the monitor and the optimization logic and communicatively linked to the grid hosts to create a new set of service instances in the proposed replacement grid host to replace the set of service instances in the failed grid host according to the best-fit in the optimization logic.
    • 已经配置用于自主故障切换的网格协调器可以包括通信地链接到服务网格中的多个网格主机的监视器。 度量存储可以耦合到监视器并被配置为存储网格主机中的各个服务实例的服务度量。 可以对优化逻辑进行编程,以计算针对故障网格主机中的一组服务实例存储的度量之间的最佳拟合,以及针对建议的替换网格主机确定的平台度量。 最后,故障切换处理器可以耦合到监视器和优化逻辑,并且通信地链接到网格主机,以在所提出的替换网格主机中创建一组新的服务实例,以替代故障网格主机中的一组服务实例,根据 在优化逻辑中最适合。
    • 80. 发明授权
    • Secure integrated device with secure, dynamically-selectable capabilities
    • 安全的集成设备,具有安全,动态可选的功能
    • US06968453B2
    • 2005-11-22
    • US09761906
    • 2001-01-17
    • Ronald P. DoyleJohn R. HindMarcia L. Peters
    • Ronald P. DoyleJohn R. HindMarcia L. Peters
    • G06F21/00G07F7/10H04L9/00
    • G07F7/1008G06F21/32G06F21/445G06F21/57G06F21/64G06Q20/341G06Q20/40145H04L63/08H04L2463/082
    • A method, system, computer program product, and method of doing business by providing a secure integrated device (such as a pervasive computing device) for which operating capabilities can be dynamically yet securely selected (including, but not limited to, pluggable connection of input/output devices and/or application processors that provide selected functions). Each input/output (I/O) device and application processor to be used is plugged in to a bus of a security core, and authenticates itself to the security core using public key infrastructure techniques, thereby creating a secure multi-function device. All of the multi-function device's input and output interactions with its environment necessarily traverse an I/O bus under the sole control of the security core. The only communication path between an application processor and the external environment (such as an I/O device) is through an application processor bus, which is likewise under control of the security core. Thus a user may dynamically yet securely select the capabilities of a multi-function device, and because each I/O device and application processor in use by that multi-function device is authenticated, the security of transactions or network services performed when using such devices is improved.
    • 一种方法,系统,计算机程序产品和通过提供安全集成设备(例如普及计算设备)来进行业务的方法,对于该安全的集成设备,可以动态地安全地选择操作能力(包括但不限于输入的可插拔连接 /输出设备和/或提供所选功能的应用处理器)。 要使用的每个输入/输出(I / O)设备和应用处理器被插入安全核心的总线,并且使用公共密钥基础设施技术将其自身认证到安全核心,由此创建安全的多功能设备。 所有多功能设备与其环境的输入和输出交互必须在安全核心的唯一控制下遍历I / O总线。 应用处理器和外部环境(例如I / O设备)之间的唯一通信路径是通过应用处理器总线,其同样在安全核心的控制下。 因此,用户可以动态地安全地选择多功能设备的能力,并且由于该多功能设备使用的每个I / O设备和应用处理器被认证,所以在使用这些设备时执行的事务或网络服务的安全性 改进了