会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Adapter for connecting a plastic pipe to a metal pipe
    • 用于将塑料管连接到金属管的适配器
    • US5169179A
    • 1992-12-08
    • US791822
    • 1991-11-13
    • Mark A. Teel, Sr.Paul D. Martin
    • Mark A. Teel, Sr.Paul D. Martin
    • F16L25/00F16L47/24
    • F16L47/24F16L25/0072
    • An adapter for connecting a plastic pipe to a metal pipe. The adapter consists of a connector having a first end and a second end with an opening extending through the second end of the connector and extending a distance through the connector toward the first end of the connector forming an inner peripheral surface. The second inner peripheral surface of the connector is threaded forming a second inside diameter of the connector which is smaller than an outside diameter of the plastic pipe. The end of the plastic pipe is threaded into the opening through the first end of the connector with the threads digging into an outer peripheral surface of the plastic pipe and compressing a portion of the plastic pipe near the first end thereof for connecting the plastic pipe to the connector. The second end of the connector is adapted to be connected to one end of the metal pipe.
    • 用于将塑料管连接到金属管的适配器。 适配器包括具有第一端和第二端的连接器,其具有延伸穿过连接器的第二端的开口,并延伸穿过连接器的距离朝向连接器的第一端形成内周面。 连接器的第二内周表面是螺纹形成的连接器的第二内径小于塑料管的外径。 塑料管的端部通过连接器的第一端螺纹连接到开口中,其中螺纹挖入塑料管的外周表面,并在其第一端附近压缩塑料管的一部分,以将塑料管连接到 连接器。 连接器的第二端适于连接到金属管的一端。
    • 3. 发明申请
    • HEALTHCARE PRIVACY BREACH PREVENTION THROUGH INTEGRATED AUDIT AND ACCESS CONTROL
    • 通过一体化审计和访问控制进行的健康隐私防范
    • US20130326579A1
    • 2013-12-05
    • US13800883
    • 2013-03-13
    • Rafae BhattiPaul D. Martin
    • Rafae BhattiPaul D. Martin
    • G06F21/62
    • H04L63/20G06F19/00G06F21/45G06F21/62G06F21/6245G06F2221/2101G06Q10/06G06Q50/24G16H10/60G16H50/70
    • A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.
    • 一种符合隐私要求的计算机实现方法。 该方法包括使用一个或多个处理器分析与访问记录的用户的历史相关的访问日志; 导出分配给用户的多个角色以及反映用户采取的动作的多个访问; 以及从所述访问日志导出包括多个映射记录的映射日志,所述映射记录包括多个映射的角色访问对。 所述方法还包括使用所述一个或多个处理器生成包括多个缩减记录的简化日志,所述缩减记录包括映射的角色访问对和与所映射的角色访问对相关联的统计信息,所述统计信息从 包括映射的角色访问对的映射记录; 以及基于所述减少的日志导出访问策略,其中所述访问策略包括多个所提出的角色访问对。
    • 4. 发明授权
    • Healthcare privacy breach prevention through integrated audit and access control
    • 通过综合审计和访问控制实现医疗隐私违规预防
    • US08984583B2
    • 2015-03-17
    • US13800883
    • 2013-03-13
    • Rafae BhattiPaul D. Martin
    • Rafae BhattiPaul D. Martin
    • G06F17/30G06F21/62G06F19/00G06Q10/06G06Q50/24G06F7/04
    • H04L63/20G06F19/00G06F21/45G06F21/62G06F21/6245G06F2221/2101G06Q10/06G06Q50/24G16H10/60G16H50/70
    • A computer-implemented method for compliance with a privacy requirement. The method comprises analyzing, using one or more processors, an access log related to a history of users accessing records; deriving a plurality of roles assigned to the users and a plurality of accesses reflecting actions taken by the users; and deriving from the access log a mapped log comprising a plurality of mapping records including a plurality of mapped role-access pairs. The method further comprises generating, using the one or more processors, a reduced log including a plurality of reduced records comprising a mapped role-access pair and statistics that are associated with the mapped role-access pair, the statistics being derived from a subset of the mapping records that include the mapped role-access pair; and deriving an access policy based on the reduced log, wherein the access policy includes a plurality of proposed role-access pairs.
    • 一种符合隐私要求的计算机实现方法。 该方法包括使用一个或多个处理器分析与访问记录的用户的历史相关的访问日志; 导出分配给用户的多个角色以及反映用户采取的动作的多个访问; 以及从所述访问日志导出包括多个映射记录的映射日志,所述映射记录包括多个映射的角色访问对。 所述方法还包括使用所述一个或多个处理器生成包括多个缩减记录的简化日志,所述缩减记录包括映射的角色访问对和与所映射的角色访问对相关联的统计信息,所述统计信息从 包括映射的角色访问对的映射记录; 以及基于所述减少的日志导出访问策略,其中所述访问策略包括多个所提出的角色访问对。