会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Network computing management
    • 网络计算管理
    • US09300539B2
    • 2016-03-29
    • US13197945
    • 2011-08-04
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • H04L12/24G06F9/50
    • H04L41/12G06F9/5072G06F2209/502
    • Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center.
    • 通过确定请求对在数据中心配置的实例的访问的请求者的位置来检索网络计算管理,检索为网络计算环境配置的数据中心的列表,以及考虑到列表中的数据中心的各个方面 请求者的位置。 通过从列表中选择满足标准阈值水平的数据中心以及哪个阈值水平超过列表中的剩余数据中心所确定的级别来进一步实现网络计算管理。 响应于确定所选择的数据中心与配置实例的数据中心不同,网络计算管理将实例重定位到所选择的数据中心。
    • 2. 发明申请
    • TRANSACTION MANAGEMENT BASED ON INDIVIDUAL ORDERS OR NUMBER OF DEVICES AT TABLE FOR DESIRED DISTRIBUTION
    • 基于个人订单的交易管理或所需分配表中的设备数量
    • US20130346243A1
    • 2013-12-26
    • US13531180
    • 2012-06-22
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06Q30/06
    • A mobile device performs admixed transactions at a merchant. The mobile device receives a purchase amount. The mobile device connects to at least one other mobile device. Responsive to connecting to the at least one other mobile device, the mobile device receives account authorization for at least one other purchase amount. Responsive to receiving the account authorization from the at least one other device, the mobile device creates an admixed authorization. The admixed authorization comprises individual account authorizations for users of the mobile device and the at least one other mobile device. The mobile device initiates a single transaction at a merchant. The mobile device transfers the admixed authorization to the merchant. Each of the individual account authorizations are applied to the single transaction based on the purchase amount and the at least one other purchase amount authorized in the individual account authorizations.
    • 移动设备在商家执行混合交易。 移动设备接收购买金额。 移动设备连接至少一个其他移动设备。 响应于连接到至少一个其他移动设备,移动设备接收至少一个其他购买量的帐户授权。 响应于从所述至少一个其他设备接收所述帐户授权,所述移动设备创建混合的授权。 混合授权包括针对移动设备和至少一个其他移动设备的用户的个人帐户授权。 移动设备在商家发起单个交易。 移动设备将混合的授权传送给商家。 每个单独的账户授权根据个人账户授权中授权的购买金额和至少一个其他购买金额应用于单笔交易。
    • 3. 发明申请
    • IDENTIFYING OPTIMAL UPGRADE SCENARIOS IN A NETWORKED COMPUTING ENVIRONMENT
    • 在网络计算环境中识别最佳升级场景
    • US20130247022A1
    • 2013-09-19
    • US13418664
    • 2012-03-13
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F9/44
    • G06F8/65
    • Embodiments of the present invention provide an approach to mitigate the risk of downtime or failed upgrades to a networked computing environment (e.g., a cloud computing infrastructure). This approach generally comprises pre-testing and evaluating potential upgrade paths to identify potential problems, and optionally recommending one or more optimal configurations. Specifically, if a proposed upgrade is identified as having potential points of failure (e.g., based on pre-testing), an end user/customer may be so notified. If the upgrade has several potential successful configurations, such configurations may be evaluated to identify a configuration that appears to have the greatest likelihood of a successful installation scenario. Optionally, the end user may then choose to redirect workload(s) to a successfully configured system that has been provisioned and pre-tested.
    • 本发明的实施例提供了一种减轻停机时间或对联网计算环境(例如,云计算基础设施)升级失败的风险的方法。 该方法通常包括预先测试和评估潜在升级路径以识别潜在的问题,以及可选地推荐一个或多个最优配置。 具体来说,如果建议的升级被确定为具有潜在的故障点(例如,基于预测试),则可以如此通知最终用户/客户。 如果升级有几个潜在的成功配置,则可以评估此​​类配置,以确定似乎最有可能成功安装场景的配置。 或者,最终用户可以选择将工作负载重定向到被配置和预先测试的成功配置的系统。
    • 4. 发明授权
    • Teleconference presentation retrieval management
    • 电话会议呈现检索管理
    • US08494143B2
    • 2013-07-23
    • US13277304
    • 2011-10-20
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • H04M3/42H04M3/00H04M5/00
    • H04L12/1822H04L51/08H04M3/56H04M7/0024H04M7/0045H04M7/0054H04M2203/5054
    • A system, method and program product for delivering to an invitee of a teleconference an electronic file attached to or referenced by a meeting notice for the teleconference. The teleconference hosted by a server computer, the invitee has a telephone to call-in to the teleconference via a telephone connection, and an invitee computer downloads the electronic file from the server computer via a first network in response to selection by the invitee of a representation of the electronic file from the meeting notice. The server computer receives a notification that a predetermined combination of keys has been pressed by the invitee on the telephone. In response, the server computer determines an e-mail address or instant message address for the invitee. The server computer attaches and sends the electronic file to an e-mail or instant message with the attached electronic file to the e-mail address or instant message address.
    • 一种系统,方法和程序产品,用于向电话会议的被邀请者递送附属于或通过电话会议的会议通知引用的电子文件。 由服务器计算机主持的电话会议,受邀者具有通过电话连接呼叫电话会议的电话,被邀请者计算机通过第一网络从服务器计算机下载电子文件,以响应受邀者的选择 会议通知电子档案的表示。 服务器计算机接收电话机上受邀者按下预定键组合的通知。 作为响应,服务器计算机确定受邀者的电子邮件地址或即时消息地址。 服务器计算机将电子文件附加到具有所附电子文件的电子邮件或即时消息到电子邮件地址或即时消息地址。
    • 5. 发明申请
    • DETERMINING RESOURCE INSTANCE PLACEMENT IN A NETWORKED COMPUTING ENVIRONMENT
    • 确定网络计算环境中的资源实际位置
    • US20130073716A1
    • 2013-03-21
    • US13238373
    • 2011-09-21
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F15/16
    • G06F9/45558G06F9/5077G06F2009/4557G06F2009/45595G06F2209/501G06F2209/502H04L47/822H04L67/1021
    • Embodiments of the present invention provide an approach for provisioning a virtual resource instance (e.g., a server instance, etc.) in a networked computing environment (e.g., a cloud computing environment) based upon network characteristics (e.g., physical locations, email addresses/configurations, network connection types, internet protocol (IP) addresses, etc.) of a set (at least one) of intended end users of the virtual resource instance. Specifically, in a typical embodiment, the network characteristics associated with the set of intended end users will be gathered and analyzed (e.g., to determine end user location, etc.). The analysis of the network characteristics will then be used to calculate/determine relative (e.g., network) efficiency scores for each intended end user for a set of potential data centers for the virtual resource instance. The relative efficiency scores for each potential data center will be summed/totaled to yield a total (e.g., network) efficiency score for each potential data center. Thereafter, the particular data center with the highest/best total efficiency score may be selected, and the requested resource instance may be provisioned at that data center.
    • 本发明的实施例提供了一种用于基于网络特性(例如,物理位置,电子邮件地址/服务器)的网络计算环境(例如,云计算环境)中的虚拟资源实例(例如,服务器实例等) 虚拟资源实例的预期最终用户的集合(至少一个)的配置,配置,网络连接类型,因特网协议(IP)地址等)。 具体地,在典型的实施例中,将收集和分析与该组预期最终用户相关联的网络特性(例如,以确定最终用户位置等)。 网络特性的分析将用于计算/确定针对虚拟资源实例的一组潜在数据中心的每个预期最终用户的相对(例如,网络)效率得分。 每个潜在数据中心的相对效率分数将被相加/合计,以产生每个潜在数据中心的总计(例如网络)效率得分。 此后,可以选择具有最高/最佳总效率得分的特定数据中心,并且可以在该数据中心处提供所请求的资源实例。
    • 6. 发明申请
    • PROXYING AN ACTIVE LINK FROM A SHARED COMPUTER
    • 从共享的计算机代替活动链接
    • US20130254682A1
    • 2013-09-26
    • US13560615
    • 2012-07-27
    • Lisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Lisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F3/01G06F15/16
    • G06F16/9558
    • Proxying an active link during a collaborative networking session includes analyzing content on a computer screen of a presenter of the collaborative networking session, and identifying the active link in the content. The active link corresponds to an image of the active link for presentation on a computer screen of a computer of a participant of the session. Proxying the active link also includes calculating a relative position of the active link with regard to the computer screen of the presenter using a two-dimensional coordinate system mapping process, creating a reproduction of the active link from the image, and placing the reproduction at a corresponding relative position on the computer screen of the participant. The reproduced active link on the computer screen of the participant is active and selectable during the session.
    • 在协作网络会话期间代理活动链路包括分析协作网络会话的演示者的计算机屏幕上的内容,以及识别内容中的活动链接。 活动链接对应于用于呈现在会话的参与者的计算机的计算机屏幕上的活动链接的图像。 代理活动链路还包括使用二维坐标系映射过程来计算主动链路相对于演示者的计算机屏幕的相对位置,从图像创建活动链接的再现,并将再现放置在 参与者的计算机屏幕上的对应的相对位置。 参与者的计算机屏幕上再现的活动链接在会话期间是活动的并且可选择。
    • 8. 发明申请
    • NETWORK COMPUTING MANAGEMENT
    • 网络计算管理
    • US20130036217A1
    • 2013-02-07
    • US13197945
    • 2011-08-04
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F15/173
    • H04L41/12G06F9/5072G06F2209/502
    • Network computing management is implemented by determining a location of a requestor requesting access to an instance configured at a data center, retrieving a list of data centers configured for a network computing environment, and evaluating aspects of the data centers in the list in view of the location of the requestor. The network computing management is further implemented by selecting a data center from the list that satisfies a threshold level of criteria and which threshold level exceeds a level ascertained for remaining data centers in the list. In response to determining the data center selected is different from the data center through which the instance is configured, the network computing management relocates the instance to the selected data center.
    • 通过确定请求对在数据中心配置的实例的访问的请求者的位置来检索网络计算管理,检索为网络计算环境配置的数据中心的列表,以及考虑到列表中的数据中心的各个方面 请求者的位置。 通过从列表中选择满足标准阈值水平的数据中心以及哪个阈值水平超过列表中的剩余数据中心所确定的级别来进一步实现网络计算管理。 响应于确定所选择的数据中心与配置实例的数据中心不同,网络计算管理将实例重定位到所选择的数据中心。
    • 10. 发明授权
    • Autoconfiguration of a cloud instance based on contextual parameters
    • 基于上下文参数自动配置云实例
    • US09323572B2
    • 2016-04-26
    • US13152090
    • 2011-06-02
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • Ryan G. DeJanaLisa Seacat DeLucaSoobaek JangDaniel C. Krook
    • G06F9/50
    • G06F9/50
    • An embodiment of the invention provides a method and system for autoconfiguring a cloud instance based on contextual parameters. More specifically, an interface receives a request for a resource from a user; and, an analysis module connected to the interface examines parameters of the resource. The parameters of the resource include an encryption parameter and a language parameter. The analysis module also examines properties of the request, including a location of the user, at least one rule at the location of the user, and a dominant language at the location of the user. A processor connected to the analysis module determines whether the encryption parameter of the resource violates the rule at the location of the user. An instance generator connected to the processor creates a customized instance of the resource when the encryption parameter of the resource violates the rule at the location of the user.
    • 本发明的实施例提供了一种基于上下文参数来自动配置云实例的方法和系统。 更具体地,接口从用户接收对资源的请求; 连接到接口的分析模块检查资源的参数。 资源的参数包括加密参数和语言参数。 分析模块还检查请求的属性,包括用户的位置,用户位置处的至少一个规则以及用户位置处的主要语言。 连接到分析模块的处理器确定资源的加密参数是否违反用户位置处的规则。 连接到处理器的实例生成器在资源的加密参数违反用户位置处的规则时创建资源的自定义实例。