Generating an ordered list of managed targets
    2.
    发明授权
    Generating an ordered list of managed targets 有权
    生成管理目标的有序列表

    公开(公告)号:US09529607B2

    公开(公告)日:2016-12-27

    申请号:US14195467

    申请日:2014-03-03

    CPC classification number: G06F9/445 G06F17/30595

    Abstract: An apparatus generates an ordered list of managed targets. A list generating hardware unit generates a list of managed targets. A list displaying hardware unit displays, on a display device, the list of managed targets. The list generating hardware unit further acquires, from a predetermined storage device, history information relating to a session for each managed target from the list of managed targets, where the history information includes information for identifying a session executor who executed the session at a session time. The list generating hardware unit is further configured to determine, using acquired history information related to the session for each managed target from the list of managed targets, an order of the managed targets in the list of managed targets according to rules that are set based on a content of managed information for each managed target.

    Abstract translation: 设备生成管理目标的有序列表。 列表生成硬件单元生成管理目标的列表。 显示硬件单元的列表在显示设备上显示受管目标的列表。 列表生成硬件单元还从预定的存储装置从管理对象的列表中获取与每个被管理目标有关的历史信息的历史信息,其中历史信息包括用于识别在会话时间执行会话的会话执行者的信息 。 列表生成硬件单元还被配置为根据管理目标列表中的每个被管理目标的与该会话相关的获取的历史信息,根据基于 每个受管目标的托管信息内容。

    Applying update to snapshots of virtual machine

    公开(公告)号:US10140115B2

    公开(公告)日:2018-11-27

    申请号:US15947931

    申请日:2018-04-09

    Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.

    Technique used in text analysis in a safe manner

    公开(公告)号:US10769308B2

    公开(公告)日:2020-09-08

    申请号:US16155071

    申请日:2018-10-09

    Abstract: A first character string in a logic, wherein the logic is a rule which analyzes input text and extracts additional information used for the text analysis, used for the text analysis with a second character string which is different form the first character string is replaced using a mapping between the first character string and the second character string. The first character string being a character or a combination of characters in a logic. A first character string is searched for in a target document for the text analysis and the first character string, if found, is replaced with the second character string, using the mapping. The logic is sent after the replacement to a server computer. The target document after the replacement is sent to the server computer. A text analysis result for the target document after the replacement is received form the server computer.

    Applying update to snapshots of virtual machine

    公开(公告)号:US10394547B2

    公开(公告)日:2019-08-27

    申请号:US15947923

    申请日:2018-04-09

    Abstract: For automatically applying update to snapshots of a virtual machine (VM), a cloned virtual machine is created reproducing a state of an existing first snapshot of a virtual machine, a first virtual NIC in the cloned VM is disabled, an update is applied to the cloned VM to which a second virtual NIC has been added, the second virtual NIC is deleted from the cloned VM to which the update has been applied, the first virtual NIC is enabled, and a second snapshot of the cloned VM is generated with the enabled first virtual NIC wherein the second snapshot is associated with the virtual machine.

    Protecting confidential information

    公开(公告)号:US10061937B1

    公开(公告)日:2018-08-28

    申请号:US15635589

    申请日:2017-06-28

    Abstract: An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential information registered in a dictionary that contains registered confidential information and substitute words corresponding to the registered confidential information. The approach includes retrieving, from the dictionary, substitute words corresponding to each identified registered confidential information and identifying, in the text generated by the user, potentially confidential words based on a text analysis of the text generated by the user. The approach includes sending to the first computer, a proposed protected text including the text generated by the user with each of the identified registered confidential information marked along with each of the retrieved substitute words to replace the identified confidential information, and each of the potentially confidential words marked along with each of one or more generated words to replace the potentially confidential words.

    Protecting confidential information

    公开(公告)号:US10032046B1

    公开(公告)日:2018-07-24

    申请号:US15826858

    申请日:2017-11-30

    Abstract: An approach using a computer, receives from a first computer, text generated by a user and identifies in the text generated by the user, confidential information registered in a dictionary that contains registered confidential information and substitute words corresponding to the registered confidential information. The approach includes retrieving, from the dictionary, substitute words corresponding to each identified registered confidential information and identifying, in the text generated by the user, potentially confidential words based on a text analysis of the text generated by the user. The approach includes sending to the first computer, a proposed protected text including the text generated by the user with each of the identified registered confidential information marked along with each of the retrieved substitute words to replace the identified confidential information, and each of the potentially confidential words marked along with each of one or more generated words to replace the potentially confidential words.

    TECHNIQUE USED IN TEXT ANALYSIS IN A SAFE MANNER

    公开(公告)号:US20170124037A1

    公开(公告)日:2017-05-04

    申请号:US14931353

    申请日:2015-11-03

    CPC classification number: G06F21/6254 G06F17/2276

    Abstract: A first character string in a logic used for the text analysis with a second character string which is different form the first character string is replaced using a mapping between the first character string and the second character string. The first character string being a character or a combination of characters in a logic. A first character string is searched for in a target document for the text analysis and the first character string, if found, is replaced with the second character string, using the mapping. The logic is sent after the replacement to a server computer. The target document after the replacement is sent to the server computer. A text analysis result for the target document after the replacement is received form the server computer.

Patent Agency Ranking