会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • AUGMENTING A VIRTUAL MACHINE HOSTING ENVIRONMENT FROM WITHIN A VIRTUAL MACHINE
    • 在虚拟机器中激活虚拟机的环境环境
    • WO2008124560A1
    • 2008-10-16
    • PCT/US2008/059345
    • 2008-04-04
    • SENTILLION, INC.HARTZ, GeorgeNALE, ChadFUSARI, David
    • HARTZ, GeorgeNALE, ChadFUSARI, David
    • G06F9/445
    • G06F8/65G06F9/445G06F9/45533
    • Systems and methods augment a virtual machine (computer) hosting environment (105) from within a virtual machine (102). A communication channel (124) between the virtual machine (102) and a player (105) is used to send instructions to the player (105) to load and execute requested software modules (110, 111, 112). Requests to load and execute the modules (110, 111, 112) may originate in a corporate network and may be issued by the corporate network administrator. If a requested module is not stored on the host computer (101), the virtual machine (102) may upload the module, via the communication channel (124), to the player (105). The uploaded module may, for example: (a) install a required upgrade in the host operating system; (b) execute virus checking software on the host computer; or (c) install a corporate network-provided secure printing module that enables software being executed by the host computer to print on devices connected to the host computer.
    • 系统和方法从虚拟机(102)内增加虚拟机(计算机)主机环境(105)。 虚拟机(102)和播放器(105)之间的通信信道(124)用于向播放器(105)发送指令以加载和执行所请求的软件模块(110,111,112)。 加载和执行模块(110,111,112)的请求可以源自公司网络,并且可以由公司网络管理员发布。 如果请求的模块未被存储在主计算机(101)上,则虚拟机(102)可以经由通信信道(124)将模块上传到播放器(105)。 上传的模块可以例如:(a)在主机操作系统中安装所需的升级; (b)在主机上执行病毒检测软件; 或(c)安装公司网络提供的安全打印模块,使得由主计算机执行的软件能够在连接到主计算机的设备上进行打印。
    • 5. 发明申请
    • METHODS AND APPARATUS FOR PERFORMING CONTEXT MANAGEMENT IN A NETWORKED ENVIRONMENT
    • 在网络环境中执行上下文管理的方法和设备
    • WO2005015400A2
    • 2005-02-17
    • PCT/US2004/021166
    • 2004-07-01
    • SENTILLION, INCFUSARI, David
    • FUSARI, David
    • G06F9/46
    • G06F9/461G06F9/54G06F19/321G06F21/6245G06F21/64H04L63/0272H04L63/029H04L67/10H04L69/329
    • Methods and apparatus related to context management in a networked environment are provided. According to one aspect, a technique is provided for facilitating communication between a client and a context management (CM) server, comprising establishing a network connection between the client and the CM server to enable communication, and maintaining the connection for the period of time during which the context is maintained. According to another aspect, a requested change in at least one aspect of a context is facilitated by publishing a change decision from the context management server to the participant applications. In another aspect, a technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client. In a further aspect, a technique is employed for verifying that two remote applications are emulated on a same client by receiving information from the remote applications that uniquely identifies the client on which they are emulated.
    • 提供了与网络环境中的上下文管理相关的方法和设备。 根据一个方面,提供了一种用于促进客户端和上下文管理(CM)服务器之间的通信的技术,包括在客户端和CM服务器之间建立网络连接以实现通信,并且在一段时间内维持连接 上下文保持。 根据另一方面,通过从上下文管理服务器向参与者应用发布改变决定来促进上下文的至少一个方面的所请求的改变。 在另一方面,采用一种技术来验证远程应用程序是通过从客户机和远程应用程序服务器上唯一标识客户端的信息在上下文中与至少一个其他应用程序在同一客户机上进行仿真的。 在另一方面,采用一种技术来验证两个远程应用程序是通过从远程应用程序接收信息来模拟的,该远程应用程序唯一地标识出在其上进行仿真的客户端。
    • 6. 发明申请
    • METHODS AND APPARATUS FOR MANAGING USER ACCESS TO A COMPUTING ENVIRONMENT
    • 管理用户访问计算环境的方法和设备
    • WO2008016580A1
    • 2008-02-07
    • PCT/US2007/017066
    • 2007-07-31
    • SENTILLION, INC.FUSARI, David
    • FUSARI, David
    • G06F21/20
    • G06F21/35G06F21/34G06F2221/2117G06F2221/2137G07C9/00031
    • Methods and apparatus for controlling user access to a computing environment. In one embodiment, a user gains access to at least one computing device at a first time by providing credential information to authenticate the user's identity; presents to a first user interface for the at least one computing device a physical device comprising identifying information to associate the device with the authenticated user; and gains access at a second time by presenting the physical device to the first user interface or a different user interface without providing the credential information. In another embodiment, in response to a user seeking access by presenting a physical device comprising identifying information, granting access only when the device was previously associated with a user who, within a grace period, provided credential information to authenticate the user's identity.
    • 控制用户访问计算环境的方法和装置。 在一个实施例中,用户通过提供用于认证用户身份的证件信息在第一时间获得对至少一个计算设备的访问; 向所述至少一个计算设备的第一用户界面呈现物理设备,所述物理设备包括识别用于将所述设备与被认证的用户相关联的信息; 并且通过在不提供证书信息的情况下将物理设备呈现给第一用户界面或不同的用户界面来第二次获得访问。 在另一个实施例中,响应于通过呈现包括识别信息的物理设备来寻求访问的用户,仅当设备先前与在宽限期期间内提供用于认证用户身份的凭证信息的用户相关联时授予访问权限。
    • 7. 发明申请
    • METHODS AND APPARATUS FOR EXTERNALLY CONTROLLING A SOFTWARE APPLICATION
    • 用于外部控制软件应用的方法和装置
    • WO2005064458A1
    • 2005-07-14
    • PCT/US2004/043753
    • 2004-12-23
    • SENTILLION, INC.FUSARI, DavidSELIGER, RobertKLEIN, Ralf, Michael
    • FUSARI, DavidSELIGER, RobertKLEIN, Ralf, Michael
    • G06F9/44
    • G06F9/461G06F9/45512G06F19/00G06Q50/22G06Q50/24G16H40/40
    • One embodiment is a method for use in a system comprising a plurality of software applications relating to healthcare and a context manager to facilitate sharing of a context between at least two of them, the context comprising a plurality of subjects including a patient subject and a user subject. The software applications comprise a first application and a target application, wherein the target application has no natively programmed capability to share the context. The method comprises providign a manipulator program that provides the target application with the capability to share the context. Another embodiment is a method for use in a system comprising a target computer having a user interface hosting environment and a target application executing thereon. The method comprises providing a manipulator program that hooks into the user interface hosting environment to provide inputs to the target application substantially simultaneously with inputs provided from a user. A further embodiment is a method of providing a manipulator program that is external to the target application and hooks into at least one application interface for the target application that is not natively programmed to be an interface to an independent external program, wherein the manipulator program is programmed to, after a user has logged into the target application, communicate with the target application via the application interface to provide the target application with a capability to perform at least one function not natively programmed.
    • 一个实施例是一种在包括与医疗保健有关的多个软件应用和上下文管理器的系统中使用的方法,以便于在其中的至少两个之间共享上下文,所述上下文包括包括患者主体和用户的多个对象 学科。 软件应用包括第一应用和目标应用,其中目标应用没有本地编程的共享上下文的能力。 该方法包括提供向目标应用提供共享上下文的能力的操纵器程序。 另一个实施例是一种在包括目标计算机的系统中使用的方法,所述目标计算机具有用户界面托管环境和在其上执行的目标应用程序。 该方法包括提供一个操纵器程序,其钩入用户界面托管环境,以基本上与用户提供的输入同时向目标应用程序提供输入。 另一实施例是一种提供在目标应用程序外部的操纵器程序的方法,并且将钩子插入到不被本地编程为独立外部程序的接口的目标应用程序的至少一个应用程序接口中,其中操纵器程序是 被编程为在用户登录到目标应用程序之后,通过应用接口与目标应用程序通信,以向目标应用提供执行至少一个不是本地编程的功能的能力。
    • 8. 发明申请
    • METHODS AND APPARATUS FOR VERIFYING CONTEXT PARTICIPANTS IN A CONTEXT MANAGEMENT SYSTEM IN A NETWORKED ENVIRONMENT
    • 用于在网络环境中验证上下文管理系统中的上下文参与者的方法和装置
    • WO2005015399A2
    • 2005-02-17
    • PCT/US2004/021165
    • 2004-07-01
    • SENTILLION, INC.FUSARI, David
    • FUSARI, David
    • G06F9/46
    • H04L61/35G06F19/321H04L29/12009H04L29/12783H04L63/029H04L67/08H04L67/28H04L67/2823H04L69/08
    • Methods and apparatus related to context management in a networked environment are provided. According to one aspect, a technique is provided for facilitating communication between a client and a context management (CM) server, comprising establishing a network connection between the client and the CM server to enable communication, and maintaining the connection for the period of time during which the context is maintained. According to another aspect, a requested change in at least one aspect of a context is facilitated by publishing a change decision from the context management server to the participant applications. In another aspect, a technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client. In a further aspect, a technique is employed for verifying that two remote applications are emulated on a same client by receiving information from the remote applications that uniquely identifies the client on which they are emulated.
    • 提供了与网络环境中的上下文管理相关的方法和设备。 根据一个方面,提供了一种用于促进客户端和上下文管理(CM)服务器之间的通信的技术,包括在客户端和CM服务器之间建立网络连接以实现通信,并且在一段时间内维持连接 上下文保持。 根据另一方面,通过从上下文管理服务器向参与者应用发布改变决定来促进上下文的至少一个方面的所请求的改变。 在另一方面,采用一种技术来验证远程应用程序是通过从客户机和远程应用程序服务器上唯一标识客户端的信息在上下文中与至少一个其他应用程序在同一客户机上仿真的。 在另一方面,采用一种技术来验证两个远程应用程序是通过从远程应用程序接收信息来模拟的,该远程应用程序唯一地标识出在其上进行仿真的客户端。
    • 10. 发明申请
    • CONTEXT MANAGEMENT WITH AUDIT CAPABILITY
    • WO2002048865A3
    • 2002-06-20
    • PCT/US2001/047877
    • 2001-12-11
    • SENTILLION, INC.
    • SELIGER, RobertFUSARI, David
    • G06F9/44
    • A context management framework is given that provides in various embodiments, numerous advantages over previously-existing systems. In some instances, an architecture having a centralized storage location coupled to a context manager is provided for servicing and logging context events from a plurality of sources. This type of system uses a synchronization scheme to perform orderly storage and retrieval of data to and from the centralized storage location. In other instances, information stored in the centralized storage location or signals from the context manager are used to achieve an auditing capacity for reviewing and acting on context data events and gestures. Selective blocking or allowance of impending context gestures or data-access events is accomplished based on a rule set or lookup table containing rules or other data to make such access-control decisions. Access to private data and other security measures may thus be implemented using the teachings presented herein. Furthermore, a communication paradigm, using a Web-proxy, which identifies ordinarily-unidentified applications to a concert manager is provided according to some embodiments of the invention.