Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

237 results about "Single entity" patented technology

Generating a customized set of tasks for migration of a deployed software solution

A migration set list generator specifies a physical topology of a deployed software solution, wherein the software solution comprises a plurality of software components and data associated with said plurality of software components integrated into a single entity. The migration set list generator specifies at least one solution change to the deployed software solution to meet at least one business requirement and specifies at least one migration strategy for migrating the deployed software solution, wherein the at least one migration strategy comprises at least one of a product level strategy specified for a particular software component of the plurality of software components and at least one solution level strategy specified for the plurality of software components, wherein the product level strategy overrides the solution level strategy for the particular software component. The migration set list generator generates a plurality of migration tasks for making the at least one solution change to the deployed software solution specified in the physical topology based on the at least one migration strategy and generates a recommended physical topology yielded for the software solution if the physical topology is updated according to the plurality of migration tasks.
Owner:IBM CORP

Certificate-based encryption and public key infrastructure

The present invention provides methods for sending a digital message from a sender (606) to a recipient (608) in a public-key based cryptosystem comprising an authorizer (606). The authorizer can be a single entity (606) or comprise a hierarchical or distributed entity (602, 604a-604b). The present invention allows communication of messages by an efficient protocol, not involving key status queries or key escrow, where a message recipient (608) can decrypt a message from a message sender (606) only if the recipient (608) possesses up-to-date authority from the authorizer. The invention allows such communication in a system comprising a large number (e.g. millions) of users.
Owner:NTT DOCOMO INC

Extensible multi-dimensional framework

Extensible Multi-Dimensional Framework (EMDF) is a system engineering framework for designing, developing and managing enterprise information technology systems. It includes two parts: multi-dimensional architecture framework (MDAF) and three-dimensional unified process (3DUP). MDAF includes comprehensive concepts for modeling an enterprise information technology system. 3DUP provides an iterative system development process. EMDF addresses an enterprise information technology system as a single entity. By projecting this entity on intertwined MDAF dimensions through the 3DUP lifecycle, all logical or physical elements encompassed in the entity will be exposed and captured in well-organized artifacts defined in MDAF. These elements are then prioritized and scheduled in a set of agile iterations. The iterations will be planned in parallel projects implemented by multiple development teams. During a long-term system development lifecycle, some elements may change. The dimensions included in MDAF provide a flexible framework to adjust system architectures, iterations and projects in order to adapt to such changes. The key deliverables of EMDF include an adaptive-to-change quality-focused architecture, optimistic agile iterations, and a market-centric business-driven risk-mitigating process.
Owner:LI DI

System and Method for Fantasy Sports Gambling

A method and system for providing an interactive gaming system is disclosed. At least one interactive social gaming community allows a plurality of users to engage in a wagering contest against a single entity. An initial amount of gaming units associated with an initial user investment is allocated to each user. A payout table is dynamically generated and includes at least one threshold amount of gaming units associated with rewards available to the user. A bet request signal received from a user is automatically reconciled with an outcome of at least one type of contest occurring during an active gaming period. A user account is updated by modifying an amount of gaming units in a user account based on a result of the at least one type of contest and determines if user has earned the reward associated with the at least one threshold.
Owner:PADDY POWER

Network fabric management via adjunct processor inter-fabric service link

An adjunct processor controls an inter-fabric service link (IFSL) coupled to at least two independent SAN switching networks. The inter-fabric service link is coupled between multiple switching fabrics to allow the attached switching fabrics to be logically managed as a single entity while still being physically independent of each other. The IFSL does not transmit nor receive data being transmitted from a storage device to a host; rather, only management data is transmitted along the IFSL. The IFSL includes an inter-fabric adjunct processor, and a plurality of connections to the attached switching fabrics on which the IFSL communicates with IFSL agents operating on various switching elements within the attached switching fabrics. IFSL agents generate management data corresponding to the particular switching element on which the agent operates. This management data is intermittently transmitted to the IFSL for processing. Upon receipt of this management data, the IFSL updates a fabric map containing the corresponding switching element according to the received management data. As a result, the IFSL has a current snapshot of the status and functionability of each of the switching elements within the attached switching fabrics. Additionally, the IFSL may respond to the received management data by transmitting operation requests to a switching element.
Owner:AVAGO TECH INT SALES PTE LTD

Method and apparatus for logging privilege use in a distributed computing environment

ActiveUS20090319527A1Facilitates tracking privilege useEasily audit privileged operationDigital data processing detailsComputer security arrangementsDistributed Computing EnvironmentClient-side
One embodiment of the present invention provides a system that logs the use of privileges in a distributed computing environment. The distributed computing environment includes a database system, one or more client applications, and a unified security management layer between the database system and the one or more client applications. During operation, the system receives a request from a client application to execute a business function in the distributed computing environment. The system determines a privilege associated with the requested business function, and logs that the request is associated with the privilege. The system then checks, in the unified security management layer, whether a user associated with the request is associated with a role that has the privilege. If the user is associated with a role that has the privilege, the system performs the requested business function. By checking and logging privilege access in the unified security management layer, the system facilitates tracking privilege use for the database system and the client applications in a single entity, thereby enabling security managers to more easily audit privileged operations in the distributed computing environment.
Owner:ORACLE INT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products