会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • ENABLING WORKFLOW AWARENESS WITHIN A BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM
    • 在业务流程管理(BPM)系统中实现工作流程意识
    • US20110179058A1
    • 2011-07-21
    • US12689536
    • 2010-01-19
    • JOSHUA L. PURCELLNELSON M. SANCHEZTASSANEE K. SUPAKKULMATHEWS THOMASJULIO WONG
    • JOSHUA L. PURCELLNELSON M. SANCHEZTASSANEE K. SUPAKKULMATHEWS THOMASJULIO WONG
    • G06F17/30
    • G06Q10/06G06Q10/103
    • Enabling workflow awareness within a business process management (BPM) system can utilize a workflow awareness controller that can receive an instantiation request for a workflow. The workflow can be comprised of multiple workflow steps to be performed by the BPM system. From workflow metadata, workflow redundancies, at the instance or step level, can be determined with other workflow instances initiated prior to the receipt of the instantiation request. The workflow metadata can include records that uniquely represent the operating parameter values of the prior workflow instances. When a workflow redundancy exists, persistent workflow data corresponding to the workflow redundancy can be utilized during the performance of a workflow instance of the requested workflow within the BPM system. The persistent workflow data can replace the performance of one or more workflow steps of the workflow instance, which can reduce the redundant performance of the workflow steps for the requested workflow.
    • 在业务流程管理(BPM)系统中启用工作流感知可以利用可以接收工作流的实例化请求的工作流感知控制器。 工作流程可以由BPM系统执行的多个工作流程组成。 可以从工作流元数据,在实例或步骤级别的工作流冗余,可以在接收到实例化请求之前启动的其他工作流实例确定。 工作流元数据可以包括唯一表示先前工作流实例的操作参数值的记录。 当存在工作流冗余时,可以在BPM系统中执行所请求的工作流的工作流实例期间利用与工作流冗余相对应的持久工作流数据。 持续工作流数据可以替代工作流实例的一个或多个工作流步骤的性能,这可以减少所请求的工作流的工作流步骤的冗余性能。
    • 4. 发明申请
    • DYNAMICALLY OPTIMIZED DISTRIBUITED CLOUD COMPUTING-BASED BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM
    • 基于动态优化的基于云计算的业务流程管理(BPM)系统
    • US20130218618A1
    • 2013-08-22
    • US13855779
    • 2013-04-03
    • JOSHUA L. PURCELLTASSANEE K. SUPAKKULMATHEWS THOMASJULIO WONG
    • JOSHUA L. PURCELLTASSANEE K. SUPAKKULMATHEWS THOMASJULIO WONG
    • G06Q10/06
    • G06Q10/06311G06F9/5072G06Q10/06G06Q10/0633
    • A workflow server can receive requests, each for a business process workflow conforming to a business process model. Each business process workflow can include a set of interdependent tasks. The workflow server can satisfy received requests by assigning tasks to different service providers that provide software services. Each of the tasks can be assigned to corresponding ones of the software services. For each task, the workflow server can also defines an allocated cost per software service, and a time allocation per software service for completing the corresponding one of the tasks. Different service providers, including those assigned to tasks, can receive information for ones of the tasks not directly assigned to them by the workflow server. The different service providers can then bid on these tasks. Wherein when bids are won, tasks for a business process flow can be reassigned based on winning bids.
    • 工作流服务器可以接收请求,每个请求用于符合业务流程模型的业务流程工作流。 每个业务流程工作流可以包括一组相互依赖的任务。 工作流服务器可以通过向提供软件服务的不同服务提供商分配任务来满足接收的请求。 每个任务都可以分配给相应的软件服务。 对于每个任务,工作流服务器还可以定义每个软件服务的分配成本,以及每个软件服务的时间分配以完成相应的一个任务。 不同的服务提供商,包括分配给任务的服务提供商,可以接收工作流服务器未直接分配给他们的任务的信息。 不同的服务提供商可以出价这些任务。 其中,当赢得投标时,可以根据获胜的出价重新分配业务流程的任务。
    • 5. 发明申请
    • MESSAGE-BASED TECHNIQUE FOR SHARING DISTRIBUTION LIST CONTENTS WITHIN ELECTRONIC MESSAGING SYSTEMS
    • 用于在电子消声系统中共享分发列表内容的基于消息的技术
    • US20100198919A1
    • 2010-08-05
    • US12363380
    • 2009-01-30
    • TASSANEE K. SUPAKKULMATHEWS THOMASJANKI Y. VORAJULIO WONG
    • TASSANEE K. SUPAKKULMATHEWS THOMASJANKI Y. VORAJULIO WONG
    • G06F15/16
    • G06Q10/107
    • Prior to transmission, distribution list data associated with a user-defined distribution list can be embedded within an electronic message. The recipients of the electronic message should be members of an electronic communications system. The distribution list data can include a copy of the user-defined distribution list or a reference to a storage location containing the user-defined distribution list where access control policies can be applied. The electronic message can be conveyed to the recipients. In response to the user-selection of a user-defined distribution list during presentation of the electronic message, the recipient can be presented with distribution list options within a user interface. The distribution list options can represent actions to be performed upon the contents of the user-selected user-defined distribution list. Prior to execution of a user-selected distribution list option, the contents of the user-selected user-defined distribution list can be accessed using the embedded distribution list data.
    • 在传输之前,与用户定义的分发列表相关联的分发列表数据可以嵌入在电子消息内。 电子信息的接收者应该是电子通信系统的成员。 分发列表数据可以包括用户定义的分发列表的副本或者对包含可以应用访问控制策略的用户定义分发列表的存储位置的引用。 电子消息可以传送给接收者。 响应于在呈现电子消息期间用户定义的分发列表的用户选择,可以在用户界面内向接收者呈现分发列表选项。 分发列表选项可以表示要根据用户选择的用户定义的分发列表的内容执行的操作。 在执行用户选择的分发列表选项之前,可以使用嵌入的分发列表数据来访问用户选择的用户定义分发列表的内容。
    • 6. 发明申请
    • AUTOMATED SOLUTION TO PROVIDE IMMEDIATE REQUISITE ACCESS TO DATA AND APPLICATIONS ON AN ATTACHED EXTERNAL DEVICE
    • 自动化解决方案即时提供数据访问和附件外部设备的应用
    • US20080120439A1
    • 2008-05-22
    • US11560405
    • 2006-11-16
    • HUNG TACK KWANTASSANEE K. SUPAKKULMATHEWS THOMAS
    • HUNG TACK KWANTASSANEE K. SUPAKKULMATHEWS THOMAS
    • G06F3/00
    • G06F9/44505
    • The present invention permits registry settings and other pertinent shared artifacts to be distributed across many different computing devices. More specifically, the invention permits applications installed on an external drive to be activated, when the external drive is connected to a main computing device. When connected, a drive agent can detect registry settings stored on the external drive and can synchronize these settings with a main registry of the main computing device. Further, interface elements, such as icons for the new applications can be added to a GUI of the main computing device. Once the registry settings are included in the main registry, applications on the external drive can used from the main computing device. When the external drive is detached from the main computing device, the device agent can automatically remove all registry settings, shared artifacts, and interface elements.
    • 本发明允许注册表设置和其他相关的共享工件被分布在许多不同的计算设备上。 更具体地,当外部驱动器连接到主计算设备时,本发明允许安装在外部驱动器上的应用被激活。 连接时,驱动代理可以检测存储在外部驱动器上的注册表设置,并可以将这些设置与主计算设备的主注册表同步。 此外,诸如新应用程序的图标的界面元素可以被添加到主计算设备的GUI。 一旦注册表设置包含在主注册表中,外部驱动器上的应用程序可以从主计算设备使用。 当外部驱动器与主计算设备分离时,设备代理可以自动删除所有注册表设置,共享工件和接口元素。
    • 7. 发明申请
    • AUTONOMOUS INTELLIGENT CONTENT ITEMS
    • 自动智能内容项目
    • US20120117016A1
    • 2012-05-10
    • US12941563
    • 2010-11-08
    • BRADLEY T. FREESETOM B. SLADEMATHEWS THOMASJULIO WONG
    • BRADLEY T. FREESETOM B. SLADEMATHEWS THOMASJULIO WONG
    • G06N5/02G06F9/46
    • G06N5/02
    • One embodiment of the disclosure provides a storage unit of digitally encoded information stored on a non-transitory storage medium. The storage unit can be referred to as an intelligent content item. The intelligent content item can include an intelligent wrapper, content data, and intelligent functions. The intelligent wrapper can enable the intelligent content item to function as a self-managing unit of storage. The content data can be contained within the intelligent wrapper. The intelligent functions can be contained within the intelligent wrapper. The intelligent functions can represent abilities of the intelligent wrapper to autonomously and dynamically manage a state of the intelligent content item and manage specifics for content consumers to access and utilize the content data.
    • 本公开的一个实施例提供了存储在非暂时性存储介质上的数字编码信息的存储单元。 存储单元可以被称为智能内容项。 智能内容项可以包括智能包装,内容数据和智能功能。 智能包装器可以使智能内容项目成为自我管理的存储单元。 内容数据可以包含在智能包装内。 智能包装中可以包含智能功能。 智能功能可以表示智能包装器的自主和动态管理智能内容项目的状态的能力,并且管理内容消费者访问和利用内容数据的细节。
    • 9. 发明申请
    • DYNAMICALLY OPTIMIZED DISTRIBUTED CLOUD COMPUTING-BASED BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM
    • 动态优化分布式云计算业务流程管理(BPM)系统
    • US20110238458A1
    • 2011-09-29
    • US12730962
    • 2010-03-24
    • JOSHUA L. PURCELLTASSANEE SUPAKKULMATHEWS THOMASJULIO WONG
    • JOSHUA L. PURCELLTASSANEE SUPAKKULMATHEWS THOMASJULIO WONG
    • G06Q10/00G06F15/16G06Q30/00
    • G06Q10/06311G06F9/5072G06Q10/06G06Q10/0633
    • A workflow server can receive requests, each for a business process workflow conforming to a business process model. Each business process workflow can include a set of interdependent tasks. The workflow server can satisfy received requests by assigning tasks to different service providers that provide software services. Each of the tasks can be assigned to corresponding ones of the software services. For each task, the workflow server can also defines an allocated cost per software service, and a time allocation per software service for completing the corresponding one of the tasks. Different service providers, including those assigned to tasks, can receive information for ones of the tasks not directly assigned to them by the workflow server. The different service providers can then bid on these tasks. Wherein when bids are won, tasks for a business process flow can be reassigned based on winning bids.
    • 工作流服务器可以接收请求,每个请求用于符合业务流程模型的业务流程工作流。 每个业务流程工作流可以包括一组相互依赖的任务。 工作流服务器可以通过将任务分配给提供软件服务的不同服务提供商来满足接收到的请求。 每个任务都可以分配给相应的软件服务。 对于每个任务,工作流服务器还可以定义每个软件服务的分配成本,以及每个软件服务的时间分配以完成相应的一个任务。 不同的服务提供商,包括分配给任务的服务提供商,可以接收工作流服务器未直接分配给他们的任务的信息。 不同的服务提供商可以出价这些任务。 其中,当赢得投标时,可以根据获胜的出价重新分配业务流程的任务。
    • 10. 发明申请
    • ADAPTIVE AUTHENTICATION SOLUTION THAT REWARDS ALMOST CORRECT PASSWORDS AND THAT SIMULATES ACCESS FOR INCORRECT PASSWORDS
    • 自适应认证解决方案,其奖励正确的密码,并模拟访问不正当的密码
    • US20090006856A1
    • 2009-01-01
    • US11768693
    • 2007-06-26
    • SUBIL ABRAHAMLEE A. CARBONELLTSZ SIMON CHENGMATHEWS THOMAS
    • SUBIL ABRAHAMLEE A. CARBONELLTSZ SIMON CHENGMATHEWS THOMAS
    • H04L9/00
    • G06F21/55
    • In the invention, incorrect authentication information for accessing at least one secured computing asset can be received. A similarity score between the incorrect authentication information and correct authentication information can be determined. One of many different access levels can be assigned to a computing session based upon the similarity score. Access consistent with the assigned access level can be granted. One access level can be an emulation access level that grants access to at least one simulated asset designed to mimic the secured asset. Access to the simulated asset can be provided in a fashion so that a user, who is likely an intruder, is unaware that they are not receiving the secured asset information. A tracking action can he optionally initiated against the intruder. Further, user behavior with the simulated session or a limited access session can be compared against a behavior profile to dynamically increase or decrease session permissions.
    • 在本发明中,可以接收用于访问至少一个安全计算资产的不正确的认证信息。 可以确定不正确的认证信息和正确认证信息之间的相似性得分。 可以基于相似性得分将许多不同访问级别中的一个分配给计算会话。 可以授予与分配的访问级别一致的访问权限。 一个访问级别可以是一个仿真访问级别,它允许访问至少一个模仿被担保资产的模拟资产。 可以以一种方式提供对模拟资产的访问,使得可能是入侵者的用户不知道他们没有接收到安全资产信息。 他可以选择针对入侵者启动跟踪操作。 此外,可以将模拟会话或受限访问会话的用户行为与行为配置文件进行比较,以动态增加或减少会话权限。