会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Using configured application pricing to determine end user fees for use of invocable services
    • 使用配置的应用定价来确定最终用户使用可调用服务的费用
    • US09044504B1
    • 2015-06-02
    • US13071368
    • 2011-03-24
    • Peter SirotaDon JohnsonGaurav D. GhareTushar JainAlan S. Geller
    • Peter SirotaDon JohnsonGaurav D. GhareTushar JainAlan S. Geller
    • G06Q30/00G07F19/00G06F7/00A61K48/00
    • A61K48/00G06Q10/06G06Q20/102G06Q30/02G06Q30/04
    • Techniques are described for facilitating use of invocable services by applications in a configurable manner. In at least some situations, the invocable services are Web services or other network-accessible services that are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of such invocable services by applications in a manner configured by the application providers and the service providers, including to track use of third-party invocable services by applications on behalf of end users and to allocate fees that are charged end users between the applications and the services as configured by the providers of the applications and services. In some situations, the configured pricing terms for a service specify fees for end users that differ in one or more ways from the defined fees charged by the provider of that service.
    • 描述了以可配置的方式促进应用使用可调用服务的技术。 在至少一些情况下,可调用的服务是Web服务或其他网络可访问的服务,这些服务由服务提供者提供,供他人使用以交换由服务提供商定义的费用。 所描述的技术有助于以应用提供商和服务提供商配置的方式由应用程序使用这种可调用服务,包括代表最终用户跟踪应用程序对第​​三方可调用服务的使用以及分配收取终端用户的费用 在由应用程序和服务的提供者配置的应用程序和服务之间。 在某些情况下,服务的配置定价条款指定终端用户的费用,这些费用以一种或多种方式与由该服务提供商收取的定义费用不同。
    • 3. 发明授权
    • Enhanced security for electronic communications
    • 增强电子通讯的安全性
    • US09225712B2
    • 2015-12-29
    • US13619921
    • 2012-09-14
    • Alan S. Geller
    • Alan S. Geller
    • H04L29/06G06F21/31G06F21/41
    • H04L63/102G06F21/31G06F21/41G06F2221/2119G06Q20/3821G06Q20/3825G06Q2220/00H04L63/0815H04L63/123
    • Techniques are described for providing enhanced security for electronic communications, such as by including in a message sent between two services a digital signature that is generated by using secret information known to the services, so that the recipient receives assurance regarding the sender's identity if the recipient can replicate the received digital signature using the secret information known to the recipient. In some situations, the enhanced security is used in communications to and/or from an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users, such as to prevent malicious phishers from inappropriately gaining access to user information. Various services may use the enhanced security techniques when interacting with the access manager system at various times, such as to initiate sign-on for a user and/or to take subsequent action on behalf of a signed-on user.
    • 描述了用于为电子通信提供增强的安全性的技术,例如通过在两个服务之间发送的消息中包括通过使用服务已知的秘密信息而生成的数字签名,使得接收方接收到关于发送者身份的保证,如果接收者 可以使用接收者已知的秘密信息来复制接收到的数字签名。 在某些情况下,增强的安全性用于与向与其他服务用户一起提供单一登录功能和其他功能的访问管理器系统的通信中,例如用于防止恶意钓鱼者不适当地获得 访问用户信息。 当在不同时间与访问管理器系统交互时,各种服务可以使用增强的安全技术,例如为用户启动登录和/或代表签名的用户采取后续动作。
    • 7. 发明授权
    • Distributed system and method for replicated storage of structured data records
    • 用于复制存储结构化数据记录的分布式系统和方法
    • US08996482B1
    • 2015-03-31
    • US11352461
    • 2006-02-10
    • Rahul SinghAlan S. GellerAmit J. Agarwal
    • Rahul SinghAlan S. GellerAmit J. Agarwal
    • G06F17/30
    • G06F17/30575
    • A distributed system and method for replicated storage of structure data records. According to one embodiment, a system may include storage hosts each configured to store and retrieve structured data records, and a data store manager configured to receive a request from a client to store a structured data record within a table. In response to receiving the request, the data store manager may be further configured to map the structured data record to a block according to a partition key value of the structured data record and an identifier of the table and to map the block to a subset comprising at least two of the plurality of storage hosts. Upon successfully storing the structured data record to the block within at least two storage hosts within the subset, the data store manager may be further configured to return to the client an indication that said request is complete.
    • 用于复制存储结构数据记录的分布式系统和方法。 根据一个实施例,系统可以包括每个被配置为存储和检索结构化数据记录的存储主机,以及数据存储管理器,被配置为从客户端接收在表内存储结构化数据记录的请求。 响应于接收到请求,数据存储管理器可以被进一步配置为根据结构化数据记录的分区键值和表的标识符将结构化数据记录映射到块,并将块映射到包括 多个存储主机中的至少两个。 在将结构化数据记录成功地存储在子集内的至少两个存储主机内的块之后,数据存储管理器可以被进一步配置为向客户端返回所述请求完成的指示。
    • 8. 发明授权
    • Enhanced security for electronic communications
    • 增强电子通讯的安全性
    • US08312523B2
    • 2012-11-13
    • US11396298
    • 2006-03-31
    • Alan S. Geller
    • Alan S. Geller
    • H04L29/06
    • H04L63/102G06F21/31G06F21/41G06F2221/2119G06Q20/3821G06Q20/3825G06Q2220/00H04L63/0815H04L63/123
    • Techniques are described for providing enhanced security for electronic communications, such as by including in a message sent between two services a digital signature that is generated by using secret information known to the services, so that the recipient receives assurance regarding the sender's identity if the recipient can replicate the received digital signature using the secret information known to the recipient. In some situations, the enhanced security is used in communications to and/or from an access manager system that provides single sign-on functionality and other functionality to other services for use with those services' users, such as to prevent malicious phishers from inappropriately gaining access to user information. Various services may use the enhanced security techniques when interacting with the access manager system at various times, such as to initiate sign-on for a user and/or to take subsequent action on behalf of a signed-on user.
    • 描述了用于为电子通信提供增强的安全性的技术,例如通过在两个服务之间发送的消息中包括通过使用服务已知的秘密信息而生成的数字签名,使得接收方接收到关于发送者身份的保证,如果接收者 可以使用接收者已知的秘密信息来复制接收到的数字签名。 在某些情况下,增强的安全性用于与向与其他服务用户一起提供单一登录功能和其他功能的访问管理器系统的通信中,例如用于防止恶意钓鱼者不适当地获得 访问用户信息。 当在不同时间与访问管理器系统交互时,各种服务可以使用增强的安全技术,例如为用户启动登录和/或代表签名的用户采取后续动作。
    • 10. 发明授权
    • Using configured application pricing to determine end user fees for use of invocable services
    • 使用配置的应用定价来确定最终用户使用可调用服务的费用
    • US07925554B1
    • 2011-04-12
    • US11618480
    • 2006-12-29
    • Peter SirotaDon JohnsonGaurav D. GhareTushar JainAlan S. Geller
    • Peter SirotaDon JohnsonGaurav D. GhareTushar JainAlan S. Geller
    • G07F19/00G06Q40/00G07G1/12G06F15/16
    • A61K48/00G06Q10/06G06Q20/102G06Q30/02G06Q30/04
    • Techniques are described for facilitating use of invocable services by applications in a configurable manner. In at least some situations, the invocable services are Web services or other network-accessible services that are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of such invocable services by applications in a manner configured by the application providers and the service providers, including to track use of third-party invocable services by applications on behalf of end users and to allocate fees that are charged end users between the applications and the services as configured by the providers of the applications and services. In some situations, the configured pricing terms for a service specify fees for end users that differ in one or more ways from the defined fees charged by the provider of that service.
    • 描述了以可配置的方式促进应用使用可调用服务的技术。 在至少一些情况下,可调用的服务是Web服务或其他网络可访问的服务,这些服务由服务提供者提供,供他人使用以交换由服务提供商定义的费用。 所描述的技术有助于以应用提供商和服务提供商配置的方式由应用程序使用这种可调用服务,包括代表最终用户跟踪应用程序对第​​三方可调用服务的使用以及分配收取终端用户的费用 在由应用程序和服务的提供者配置的应用程序和服务之间。 在某些情况下,服务的配置定价条款指定终端用户的费用,这些费用以一种或多种方式与由该服务提供商收取的定义费用不同。