Security management in a networked computing environment
    62.
    发明授权
    Security management in a networked computing environment 有权
    联网计算环境中的安全管理

    公开(公告)号:US09361455B2

    公开(公告)日:2016-06-07

    申请号:US13732678

    申请日:2013-01-02

    Abstract: An approach for addressing (e.g., preventing) detected network intrusions in a virtualized/networked (e.g., cloud) computing environment is provided. In a typical embodiment, users may group components/systems of an environment/domain according to a range of security sensitivity levels/classifications. The users may further configure rules for responding to security threats for each security sensitivity level/classification. For example, if a “highly dangerous” security threat is detected in or near a network segment that contains highly sensitive systems, the user may configure rules that will automatically isolate those systems that fall under the high security classification. Such an approach allows for more granular optimization and/or management of system security/intrusion prevention that may be managed at a system level rather than at a domain level.

    Abstract translation: 提供了一种在虚拟化/网络化(例如,云)计算环境中寻址(例如,防止)检测到的网络入侵的方法。 在典型的实施例中,用户可以根据安全敏感度级别/分类的范围对环境/域的组件/系统进行分组。 用户可以进一步配置用于响应每个安全敏感度级别/分类的安全威胁的规则。 例如,如果在包含高度敏感的系统的网段中或附近检测到“高度危险”的安全威胁,则用户可以配置将自动隔离那些属于高安全级别的系统的规则。 这种方法允许对系统安全性/入侵防御进行更细粒度的优化和/或管理,该系统安全/入侵防御可以在系统级别而不是在域级别进行管理。

    RECOMMENDING PRINTERS AND SUGGESTING ACTIONS FOR TAILORED AND EFFICIENT FULFILLMENT OF PRINT REQUESTS
    64.
    发明申请
    RECOMMENDING PRINTERS AND SUGGESTING ACTIONS FOR TAILORED AND EFFICIENT FULFILLMENT OF PRINT REQUESTS 审中-公开
    推荐打印机和建议采取有针对性的有效打印请求的措施

    公开(公告)号:US20150378646A1

    公开(公告)日:2015-12-31

    申请号:US14314152

    申请日:2014-06-25

    CPC classification number: G06F3/126 G06F3/1211 G06F3/1292

    Abstract: A method for recommending printers and suggesting actions for tailored and efficient fulfillment of print requests is provided. The method provides: receiving, by a printer service, a request to generate a print job. The request comprises a proximity to a requestor, and a plurality of printer properties. The printers in a collection of potential printers are matched for a proximity to the requestor and the plurality of printer properties. A list of top matching available printers is created, based on the proximity to the requestor and the plurality of printer properties. A list of unavailable and incompatible printers is created, based on the matching of the proximity to the requestor. Both lists are displayed. The print job is sent to the printer that the requestor selects.

    Abstract translation: 提供了一种用于推荐打印机和建议用于定制和有效地实现打印请求的动作的方法。 该方法提供:由打印机服务接收生成打印作业的请求。 该请求包括邻近请求者和多个打印机属性。 一组潜在的打印机中的打印机与请求者和多个打印机属性的接近度相匹配。 基于与请求者和多个打印机属性的接近度,创建顶部匹配的可用打印机的列表。 基于与请求者的接近度的匹配,创建不可用和不兼容打印机的列表。 显示两个列表。 打印作业被发送到请求者选择的打印机。

    SOCIAL MEDIA MESSAGE DELIVERY BASED ON USER LOCATION
    65.
    发明申请
    SOCIAL MEDIA MESSAGE DELIVERY BASED ON USER LOCATION 审中-公开
    基于用户位置的社会媒体信息传递

    公开(公告)号:US20150281159A1

    公开(公告)日:2015-10-01

    申请号:US14227047

    申请日:2014-03-27

    CPC classification number: H04L51/20 G06K9/00671 H04L51/10 H04L51/32 H04L67/18

    Abstract: An approach for delaying social media messages is provided herein. A first computing device receives user preferences. The first computing device detects a social media message of a user. The first computing device determines that the user is not in the physical location. The first computing device determines whether to delay the posting of the social media message based on a comparison of the content of the social media message with the received user preferences.

    Abstract translation: 本文提供了延迟社交媒体消息的方法。 第一计算设备接收用户偏好。 第一计算设备检测用户的社交媒体消息。 第一计算设备确定用户不在物理位置。 第一计算设备基于社交媒体消息的内容与接收到的用户偏好的比较来确定是否延迟发布社交媒体消息。

    Sharing electronic file metadata in a networked computing environment
    66.
    发明授权
    Sharing electronic file metadata in a networked computing environment 有权
    在联网计算环境中共享电子文件元数据

    公开(公告)号:US09122696B2

    公开(公告)日:2015-09-01

    申请号:US13706614

    申请日:2012-12-06

    Abstract: Embodiments of the present invention provide an approach for sharing electronic file metadata in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, metadata related to electronic files stored in a shared storage device is maintained and updated. Such metadata may be viewable via a user interface of one or more applications used to access the files (e.g., from a plurality of computerized/electronic devices). Among other things, the metadata may identify previous accesses of the files (e.g., by user, date/time, etc.), and may be provided in a list or the like.

    Abstract translation: 本发明的实施例提供了一种在网络计算环境(例如,云计算环境)中共享电子文件元数据的方法。 在典型的实施例中,维护和更新与存储在共享存储设备中的电子文件相关的元数据。 这样的元数据可以经由用于访问文件(例如,从多个计算机化/电子设备)的一个或多个应用的​​用户界面来查看。 除其他之外,元数据可以识别文件的先前访问(例如,由用户,日期/时间等),并且可以在列表等中提供。

    VISUALIZATION OF DATA RELATED TO UNSTRUCTURED TEXT
    67.
    发明申请
    VISUALIZATION OF DATA RELATED TO UNSTRUCTURED TEXT 审中-公开
    与未经修改的文本相关的数据可视化

    公开(公告)号:US20150077419A1

    公开(公告)日:2015-03-19

    申请号:US14031541

    申请日:2013-09-19

    CPC classification number: G06T11/206 G06F17/27

    Abstract: In a method for visualizing data related to unstructured text, a computer identifies at least two data points in a portion of unstructured text of a document, a relationship between the at least two data points, and a label for each of the at least two data points. The computer determines a type of graph to create based on the identified data. The computer causes the at least two data points and the label for each of the at least two data points, and the relationship between the at least two data points to be visualized on a graph. The computer causes a modified graph based on the received instructions to be visualized. The computer causes the modified graph to be displayed in the document having the unstructured text.

    Abstract translation: 在用于可视化与非结构化文本相关的数据的方法中,计算机识别文档的非结构化文本的一部分中的至少两个数据点,所述至少两个数据点之间的关系以及所述至少两个数据中的每一个的标签 积分 计算机根据识别的数据确定要创建的图形类型。 计算机使至少两个数据点和至少两个数据点中的每一个的标签,并且至少两个数据点之间的关系在图形上可视化。 计算机使得基于接收到的指令的修改图形被可视化。 计算机使修改后的图形显示在具有非结构化文本的文档中。

    DIRECTIONAL VEHICULAR ADVERTISEMENTS
    68.
    发明申请
    DIRECTIONAL VEHICULAR ADVERTISEMENTS 审中-公开
    方向性航空广告

    公开(公告)号:US20150058127A1

    公开(公告)日:2015-02-26

    申请号:US13975801

    申请日:2013-08-26

    CPC classification number: G06Q30/0266 G09F21/048

    Abstract: Directional vehicular advertisements displayed on a vehicle. A system in accordance with an embodiment includes: a location system for determining a location and a direction of travel of a vehicle; at least one forward facing advertisement slot on the vehicle, wherein each forward facing advertisement slot faces oncoming traffic travelling in a direction opposite to the direction of travel of the vehicle; a plurality of advertisements, each advertisement associated with a location; and a controller configured to select and display at least one of the advertisements via at least one of the forward facing advertisement slots, wherein each displayed advertisement is associated with a location that the oncoming traffic has yet to pass.

    Abstract translation: 在车辆上显示的定向车辆广告。 根据实施例的系统包括:用于确定车辆的位置和行进方向的位置系统; 车辆上的至少一个向前的广告槽,其中每个前向广告槽面向在与车辆的行进方向相反的方向上行进的迎面而来的交通工具; 多个广告,每个广告与位置相关联; 以及控制器,被配置为经由至少一个前向广告时隙选择和显示至少一个广告,其中每个显示的广告与迎面而来的交通尚未通过的位置相关联。

    ENFORCING RUNTIME POLICIES IN A NETWORKED COMPUTING ENVIRONMENT
    69.
    发明申请
    ENFORCING RUNTIME POLICIES IN A NETWORKED COMPUTING ENVIRONMENT 有权
    在网络计算环境中执行运行政策

    公开(公告)号:US20150012630A1

    公开(公告)日:2015-01-08

    申请号:US13934338

    申请日:2013-07-03

    Abstract: Embodiments of the present invention provide approaches for enforcing runtime policies in a networked computing environment (e.g., a cloud computing environment). Specifically, in a typical embodiment, computer code and data of an application is annotated with metadata defining a set of runtime policies for executing the computer code and data. Once a request is received to run the application, a set of parameters (e.g., geographic location) corresponding to the execution of the computer code and data of the application is dynamically determined, and compared to the runtime policies. The runtime policies for executing the computer code and data are then enforced at runtime. This includes either running the application, or preventing the running of the application in the case that the set of parameters corresponding to the execution of the computer code and data of the application do not satisfy the runtime policies.

    Abstract translation: 本发明的实施例提供了在网络计算环境(例如,云计算环境)中实施运行时策略的方法。 具体地,在典型的实施例中,应用程序的代码和数据用定义用于执行计算机代码和数据的一组运行时策略的元数据来注释。 一旦接收到运行应用的请求,就动态地确定与计算机代码的执行和应用的数据相对应的一组参数(例如,地理位置),并与运行时策略进行比较。 然后在运行时执行用于执行计算机代码和数据的运行时策略。 这包括运行应用程序,或者在与计算机代码的执行对应的一组参数和应用程序的数据不满足运行时策略的情况下,阻止运行应用程序。

    CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE
    70.
    发明申请
    CLASSIFYING FILES ON A MOBILE COMPUTER DEVICE 有权
    在移动计算机设备上分类文件

    公开(公告)号:US20140282814A1

    公开(公告)日:2014-09-18

    申请号:US13799257

    申请日:2013-03-13

    Abstract: A client computer extracts contextual information associated with a file that is created. The client computer generates scores for the file by utilizing the contextual information that is extracted. The client computer assigns a value to the file, based on an aggregation of the scores that are generated. The client computer monitors activities on the client computer, wherein the activities trigger an event on the client computer. The client computer determines whether the event is in violation of one or more computer security policies on a server computer, wherein the one or more computer security policies require work-related files to be deleted or encrypted. The client computer classifies the file as personal data or work-related business data. The client computer secures the file, if the file is classified as work-related business data.

    Abstract translation: 客户端计算机提取与创建的文件相关联的上下文信息。 客户端计算机通过利用提取的上下文信息来生成文件的分数。 客户端计算机根据生成的分数的聚合为文件分配一个值。 客户端计算机监视客户端计算机上的活动,其中活动触发客户端计算机上的事件。 客户端计算机确定事件是否违反服务器计算机上的一个或多个计算机安全策略,其中一个或多个计算机安全策略要求删除或加密工作相关文件。 客户端计算机将文件分类为个人数据或与工作相关的业务数据。 如果文件被归类为工作相关业务数据,则客户端计算机将文件保护。

Patent Agency Ranking