会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 84. 发明授权
    • Natural language interface
    • 自然语言界面
    • US08862458B2
    • 2014-10-14
    • US12956448
    • 2010-11-30
    • Uwe FreisingMarit Rams
    • Uwe FreisingMarit Rams
    • G06F17/27G06F17/30
    • G06F17/30663G06F17/2785
    • The present disclosure involves systems, software, and computer implemented methods for providing a natural language interface for searching a database. One process includes operations for receiving a natural language query. One or more tokens contained in the natural language query are identified. A set of sentences is generated based on the identified tokens, each sentence representing a possible logical interpretation of the natural language query and including a combination of at least one of the identified tokens. At least one sentence in the set of sentences is selected for searching a database based on the identified tokens.
    • 本公开涉及用于提供用于搜索数据库的自然语言界面的系统,软件和计算机实现的方法。 一个过程包括用于接收自然语言查询的操作。 识别包含在自然语言查询中的一个或多个标记。 基于识别的令牌生成一组句子,每个句子表示自然语言查询的可能的逻辑解释,并且包括至少一个识别的令牌的组合。 选择该组句子中的至少一个句子用于基于所识别的令牌来搜索数据库。
    • 85. 发明授权
    • Interactive authentication
    • 互动认证
    • US08856892B2
    • 2014-10-07
    • US13534614
    • 2012-06-27
    • Gabor Faludi
    • Gabor Faludi
    • G06F7/04G06F15/16G06F17/30H04L29/06H04L9/32G06F21/62G06F21/00
    • H04L9/32G06F15/16G06F21/00G06F21/31G06F21/62G06F2212/178G06F2221/2137H04L9/3213H04L9/3228H04L9/3234H04L63/0846
    • The present disclosure describes methods, systems, and computer program products for interactive authentication can include receiving a valid authentication credential or an invalid authentication credential associated with a digital identity. The credentials can be received from an end user at an input device in association with a login attempt. If a valid authentication credential is received, it is determined whether an identification token is received with the valid authentication credential. If received, the identification token is identified as a token included in a list of valid tokens associated with the digital identity at an authentication system. In response to the determination that the identification token is included in the list of valid tokens, it is determined whether a lockout period associated with the identification token in the list of valid tokens has expired. If expired, the end user associated with the login attempt can be authenticated.
    • 本公开描述用于交互式认证的方法,系统和计算机程序产品可以包括接收与数字身份相关联的有效认证证书或无效认证证书。 在登录尝试中可以从输入设备的最终用户接收凭证。 如果接收到有效的认证凭证,则确定是否使用有效的认证凭证接收到识别令牌。 如果接收到,识别令牌被识别为包括在与认证系统上的数字身份相关联的有效令牌的列表中的令牌。 响应于识别令牌被包括在有效令牌列表中的确定,确定与有效令牌列表中的识别令牌相关联的锁定期间是否已经过期。 如果过期,与登录尝试相关联的最终用户可以被认证。
    • 86. 发明授权
    • Solution packages including segments of a process chain
    • 解决方案包,包括流程链的细分
    • US08856770B2
    • 2014-10-07
    • US12884912
    • 2010-09-17
    • Roland HoffBernhard Hartenstein
    • Roland HoffBernhard Hartenstein
    • G06F9/44G06F9/45G06Q10/00G06Q10/06
    • G06Q10/06G06Q10/063
    • In one general aspect, a computer system can include an existing process chain module configured to receive a plurality of segment definitions representing a plurality of existing segments defining an existing process chain implemented in a target system. The computer system can include a proposed process chain module configured to select, based on the plurality of segment definitions, a proposed process chain including a first proposed segment corresponding with an existing segment from the plurality of existing segments, and including a second proposed segment different from each existing segment from the plurality of existing segments. The computer system can include an operational relationship module configured to define an option for an operational relationship between the existing segment from the plurality of existing segments and the second proposed segment of the proposed process chain.
    • 在一个一般方面,计算机系统可以包括现有的过程链模块,其被配置为接收表示定义在目标系统中实现的现有过程链的多个现有段的多个段定义。 计算机系统可以包括所提出的进程链模块,其被配置为基于所述多个段定义来选择所提出的过程链,所述过程链包括与来自所述多个现有段的现有段对应的第一建议段,并且包括第二建议段 来自多个现有段的每个现有段。 计算机系统可以包括操作关系模块,其被配置为定义用于来自多个现有段的现有段与所提出的进程链的第二建议段之间的操作关系的选项。
    • 87. 发明授权
    • Systems and methods for enhanced profiling of computer applications
    • 增强计算机应用程序分析的系统和方法
    • US08856754B2
    • 2014-10-07
    • US12314692
    • 2008-12-15
    • Udo Klein
    • Udo Klein
    • G06F9/44G06F11/34
    • G06F11/3476G06F11/3409G06F11/3419G06F2201/81G06F2201/88
    • Systems, methods, and computer-readable media are disclosed for enhanced profiling. An exemplary method includes initiating an execution of a software application which includes a plurality of routines, storing information related to data inputs to the plurality of routines during the execution of the software application, storing resource consumption information for the plurality of routines during the execution of the software application, correlating the resource consumption information for the plurality of routines to a size of the data inputs, and analyzing the correlated resource consumption information to determine a subset of the plurality of routines that exhibit at least a threshold amount of resource consumption with increasing size of the data inputs.
    • 公开了用于增强分析的系统,方法和计算机可读介质。 一种示例性方法包括启动软件应用程序的执行,该软件应用程序包括多个例程,在执行软件应用期间将与数据输入有关的信息存储到多个例程,在执行期间存储多个例程的资源消耗信息 所述软件应用程序将所述多个例程的资源消耗信息与所述数据输入的大小相关联,并且分析所述相关资源消耗信息以确定所述多个例程的子集,其随着增加而呈现至少阈值量的资源消耗 数据输入的大小。