会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • Resolving names to network endpoints
    • 将名称解析为网络端点
    • US20080016234A1
    • 2008-01-17
    • US11486782
    • 2006-07-14
    • Noah HortonEliot J. FlanneryGianluigi NuscaScott A. SenkerestySandeep K. Singhal
    • Noah HortonEliot J. FlanneryGianluigi NuscaScott A. SenkerestySandeep K. Singhal
    • G06F15/16
    • H04L61/1564H04L29/1215H04L67/104
    • A system, apparatus, method, and computer-readable medium are provided for resolving a name to a network endpoint. According to one method, naming providers are registered with a computer system that are operative to resolve names to network endpoints for one or more domains. A provider can claim to be a primary provider or a secondary provider for a domain. A provider can also register as a wildcard provider. Once the providers have been registered, requests may be received to resolve an e-mail address into a network address of the corresponding computer system. In response to such a request, one or more of the registered providers are identified as being able to resolve names in the domain to network addresses. Requests are transmitted to the identified providers requesting that they resolve the e-mail address to a corresponding network address. The manner in which the requests are made depends upon whether authoritative results are required. Once the results of the name resolution have been returned, the results are utilized to establish a network connection to and communicate with the computer system identified by the returned network address.
    • 提供了一种用于将名称解析为网络端点的系统,装置,方法和计算机可读介质。 根据一种方法,命名提供者被注册到计算机系统,该计算机系统可操作以将名称解析为一个或多个域的网络端点。 提供商可以声称是域的主要提供商或辅助提供商。 提供商也可以注册为通配符提供商。 一旦提供者被注册,可以接收请求以将电子邮件地址解析成相应计算机系统的网络地址。 响应于这样的请求,一个或多个注册的提供者被识别为能够将域中的名称解析为网络地址。 请求被发送到所识别的提供者,请求他们将电子邮件地址解析为相应的网络地址。 请求的方式取决于是否需要权威的结果。 一旦返回了名称解析的结果,结果被用于建立与由返回的网络地址识别的计算机系统的网络连接并与之通信。
    • 6. 发明授权
    • Resolving names to network endpoints
    • 将名称解析为网络端点
    • US07711853B2
    • 2010-05-04
    • US11486782
    • 2006-07-14
    • Noah HortonEliot J. FlanneryGianluigi NuscaScott A. SenkerestySandeep K. Singhal
    • Noah HortonEliot J. FlanneryGianluigi NuscaScott A. SenkerestySandeep K. Singhal
    • G06F15/16
    • H04L61/1564H04L29/1215H04L67/104
    • A system, apparatus, method, and computer-readable medium are provided for resolving a name to a network endpoint. According to one method, naming providers are registered with a computer system that are operative to resolve names to network endpoints for one or more domains. A provider can claim to be a primary provider or a secondary provider for a domain. A provider can also register as a wildcard provider. Once the providers have been registered, requests may be received to resolve an e-mail address into a network address of the corresponding computer system. In response to such a request, one or more of the registered providers are identified as being able to resolve names in the domain to network addresses. Requests are transmitted to the identified providers requesting that they resolve the e-mail address to a corresponding network address. The manner in which the requests are made depends upon whether authoritative results are required. Once the results of the name resolution have been returned, the results are utilized to establish a network connection to and communicate with the computer system identified by the returned network address.
    • 提供了一种用于将名称解析为网络端点的系统,装置,方法和计算机可读介质。 根据一种方法,命名提供者被注册到计算机系统,该计算机系统可操作以将名称解析为一个或多个域的网络端点。 提供商可以声称是域的主要提供商或辅助提供商。 提供商也可以注册为通配符提供商。 一旦提供者被注册,可以接收请求以将电子邮件地址解析成相应计算机系统的网络地址。 响应于这样的请求,一个或多个注册的提供者被识别为能够将域中的名称解析为网络地址。 请求被发送到所识别的提供者,请求他们将电子邮件地址解析为相应的网络地址。 请求的方式取决于是否需要权威的结果。 一旦返回了名称解析的结果,结果被用于建立与由返回的网络地址识别的计算机系统的网络连接并与之通信。
    • 7. 发明授权
    • Collaborative invitation system and method
    • 协同邀请系统和方法
    • US07752253B2
    • 2010-07-06
    • US11114634
    • 2005-04-25
    • Todd R. ManionDavid G. ThalerRohit GuptaSandeep K. SinghalRavi T. RaoTomer Weisberg
    • Todd R. ManionDavid G. ThalerRohit GuptaSandeep K. SinghalRavi T. RaoTomer Weisberg
    • G06F19/00
    • G06Q10/10
    • A set of collaborative contacts may be selected with an invitation user interface. An invitation to participate in a collaborative activity may be sent to the selected contacts from the invitation user interface or from a collaborative application. The invitation may be received by a collaborative services platform. A user of the collaborative services platform may be presented with the invitation along with an ability to choose one of accept, decline and ignore in response to the invitation. The user may choose to accept, decline or explicitly ignore the invitation, and a response may be sent to the sender of the invitation indicating the user's choice. An application programming interface for a collaborative invitation service of the collaborative services platform may include an invitation element, a send invitation element, a respond to invitation element and a cancel invitation element. The cancel invitation element may be used to cancel issued invitations.
    • 可以使用邀请用户界面选择一组协作联系人。 参与协作活动的邀请可以从邀请用户界面或协作应用发送到所选择的联系人。 邀请可以由协作服务平台接收。 可以向协作服务平台的用户呈现邀请以及响应于邀请选择接受,拒绝和忽略之一的能力。 用户可以选择接受,拒绝或明确地忽略邀请,并且可以向邀请的发送者发送响应,指示用户的选择。 用于协作服务平台的协作邀请服务的应用编程界面可以包括邀请元素,发送邀请元素,对邀请元素的响应和取消邀请元素。 取消邀请元素可用于取消发出的邀请。
    • 9. 发明授权
    • Peer-to-peer authentication and authorization
    • 对等认证和授权
    • US07350074B2
    • 2008-03-25
    • US11110592
    • 2005-04-20
    • Rohit GuptaTodd R. ManionRavi T. RaoSandeep K. Singhal
    • Rohit GuptaTodd R. ManionRavi T. RaoSandeep K. Singhal
    • H04K1/00H04L9/00H04L9/32
    • H04L9/321H04L9/3265H04L63/0823H04L63/0869H04L2209/80
    • An authentication mechanism uses a trusted people store that can be populated on an individual basis by users of computing devices, and can comprise certificates of entities that the user wishes to allow to act as certification authorities. Consequently, peer-to-peer connections can be made even if neither device presents a certificate or certificate chain signed by a third-party certificate authority, so long as each device present a certificate or certificate chain signed by a device present in the trusted people store. Once authenticated, a remote user can access trusted resources on a host device by having local processes mimic the user and create an appropriate token by changing the user's password or password type to a hash of the user's certificate and then logging the user on. The token can be referenced in a standard manner to determine whether the remote user is authorized to access the trusted resource.
    • 认证机制使用可被计算设备的用户单独填充的受信任的人员存储,并且可以包括用户希望允许作为认证机构的实体的证书。 因此,即使两个设备都没有呈现由第三方认证机构签名的证书或证书链,只要每个设备呈现由可信任人员中存在的设备签名的证书或证书链,就可以进行对等连接 商店。 一旦经过身份验证,远程用户可以通过使本地进程模仿用户并通过将用户的密码或密码类型更改为用户证书的哈希值,然后记录用户来创建适当的令牌来访问主机设备上的受信任资源。 可以以标准方式引用令牌,以确定远程用户是否被授权访问受信任的资源。