会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Using configured application pricing to determine end user fees for use of invocable services
    • 使用配置的应用定价来确定最终用户使用可调用服务的费用
    • US09044504B1
    • 2015-06-02
    • US13071368
    • 2011-03-24
    • Peter SirotaDon JohnsonGaurav D. GhareTushar JainAlan S. Geller
    • Peter SirotaDon JohnsonGaurav D. GhareTushar JainAlan S. Geller
    • G06Q30/00G07F19/00G06F7/00A61K48/00
    • A61K48/00G06Q10/06G06Q20/102G06Q30/02G06Q30/04
    • Techniques are described for facilitating use of invocable services by applications in a configurable manner. In at least some situations, the invocable services are Web services or other network-accessible services that are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of such invocable services by applications in a manner configured by the application providers and the service providers, including to track use of third-party invocable services by applications on behalf of end users and to allocate fees that are charged end users between the applications and the services as configured by the providers of the applications and services. In some situations, the configured pricing terms for a service specify fees for end users that differ in one or more ways from the defined fees charged by the provider of that service.
    • 描述了以可配置的方式促进应用使用可调用服务的技术。 在至少一些情况下,可调用的服务是Web服务或其他网络可访问的服务,这些服务由服务提供者提供,供他人使用以交换由服务提供商定义的费用。 所描述的技术有助于以应用提供商和服务提供商配置的方式由应用程序使用这种可调用服务,包括代表最终用户跟踪应用程序对第​​三方可调用服务的使用以及分配收取终端用户的费用 在由应用程序和服务的提供者配置的应用程序和服务之间。 在某些情况下,服务的配置定价条款指定终端用户的费用,这些费用以一种或多种方式与由该服务提供商收取的定义费用不同。
    • 4. 发明授权
    • Resource placement templates for virtual networks
    • 用于虚拟网络的资源放置模板
    • US08484353B1
    • 2013-07-09
    • US12892850
    • 2010-09-28
    • Don JohnsonEric J. BrandwineMarvin M. TheimerSwaminathan Sivasubramanian
    • Don JohnsonEric J. BrandwineMarvin M. TheimerSwaminathan Sivasubramanian
    • G06F15/173
    • H04L47/70G06F9/5077G06F21/53G06F2221/2149H04L67/10
    • With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware. For example, virtualization technologies can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing one or more virtual machines simulated in software by the single physical computing machine, with each virtual machine acting as a distinct logical computing system. In addition, as routing can be accomplished through software, additional network setup flexibility can be provided to the virtual network in comparison with hardware-based routing. In some implementations, virtual network setup can be abstracted through the use of resource placement templates, allowing users to create virtual networks compliant with a customer's networking policies without necessarily having knowledge of what those policies are.
    • 随着虚拟化技术的出现,现在可以使用商品硬件来模拟这些网络的网络和路由。 例如,虚拟化技术可以被适配为允许单个物理计算机器在多个虚拟网络之间共享,通过提供由单个物理计算机器以软件模拟的一个或多个虚拟机,每个虚拟机充当不同的逻辑计算系统 。 另外,由于可以通过软件实现路由,与基于硬件的路由相比,可以向虚拟网络提供额外的网络设置灵活性。 在一些实现中,可以通过使用资源放置模板来抽象虚拟网络设置,从而允许用户创建符合客户网络策略的虚拟网络,而不必知道这些策略是什么。
    • 10. 发明授权
    • Controlling use of computing-related resources by multiple independent parties
    • 由多个独立方控制计算相关资源的使用
    • US08429757B1
    • 2013-04-23
    • US13277070
    • 2011-10-19
    • Mark Joseph CavageJohn CormieNathan R. FitchDon JohnsonPeter Sirota
    • Mark Joseph CavageJohn CormieNathan R. FitchDon JohnsonPeter Sirota
    • H04L29/06
    • H04L63/10G06F21/604G06F21/6218G06F2221/2141H04L63/0227H04L63/102H04L63/20
    • Techniques are described for managing access to computing-related resources that, for example, may enable multiple distinct parties to independently control access to the resources (e.g., such that a request to access a resource succeeds only if all of multiple associated parties approve that access). For example, an executing software application may, on behalf of an end user, make use of computing-related resources of one or more types that are provided by one or more remote third-party network services (e.g., data storage services provided by an online storage service) —in such a situation, both the developer user who created the software application and the end user may be allowed to independently specify access rights for one or more particular such computing-related resources (e.g., stored data files), such that neither the end user nor the software application developer user may later access those resources without the approval of the other party.
    • 描述了用于管理对计算相关资源的访问的技术,例如,可以使多个不同方独立地控制对资源的访问(例如,使得只有当所有多个关联方批准该访问时,访问资源的请求才能成功 )。 例如,执行的软件应用程序可以代表最终用户利用由一个或多个远程第三方网络服务提供的一种或多种类型的计算相关资源(例如,由 在这种情况下,可以允许创建软件应用程序的开发者用户和终端用户独立地指定一个或多个特定的这样的计算相关资源(例如,存储的数据文件)的访问权限,例如, 最终用户和软件应用程序开发者用户以后都不可以在未经对方批准的情况下访问这些资源。