会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 16. 发明授权
    • Variable domain resource data security for data processing systems
    • 数据处理系统的可变域资源数据安全
    • US09043899B2
    • 2015-05-26
    • US14084270
    • 2013-11-19
    • Versata Development Group, Inc.
    • Jacy M. LegaultJon Loyens
    • G06F7/04G06F21/44H04L29/06G06F21/60
    • G06F21/6218G06F21/44G06F21/604G06F2221/2113H04L63/105
    • The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model.
    • 本文所述的可变域数据访问控制系统和方法使用相同的可变域来描述数据安全模型和诸如产品配置模型的可变域数据模型。 可变域是可以使用逻辑关系数据结构描述的一组资源数据。 可变域使用诸如布尔逻辑语言之类的逻辑关系表达式,以部件,规则和/或属性的方式定义资源数据,以及可以访问以查看,操作或其他目的的任何其他属性。 数据安全模型表示一个访问控制列表(ACL),其包括作为资源数据的安全属性,并且使用与相关联的可变域数据模型相同的数据结构和逻辑关系表达式。 可以使用应用程序(如配置引擎)使用数据安全模型来创建对可变域数据模型的受控访问。
    • 17. 发明授权
    • Electronic commerce integration
    • 电子商务整合
    • US08849709B1
    • 2014-09-30
    • US13621542
    • 2012-09-17
    • Versata Development Group, Inc.
    • Guy Miller
    • G06Q30/00G06Q30/06
    • G06Q30/0623G06Q30/00G06Q30/0601G06Q30/0625G06Q30/0639G06Q30/0641
    • An information system environment is described that, among other things, facilitates integration of electronic commerce and physical store front retailer selling channels. In some realizations, the system includes a shopper accessible kiosk co-located with a physical store front retailer and an electronic commerce information service accessible from locations external to the physical store front retailer. Both access inventory information supplied from a suitable information service. The shopper accessible kiosk allows a user thereof to access inventory information particular to the physical store front retailer, while the electronic commerce information service allows a user thereof to order items from out of stock of the physical store front retailer.
    • 描述了一种信息系统环境,其中包括促进电子商务和实体店面零售商销售渠道的整合。 在一些实现中,该系统包括与物理店面零售商共同设置的购物者可访问的信息亭和可从实体店面零售商的外部位置访问的电子商务信息服务。 两者都访问从合适的信息服务提供的库存信息。 购物者可访问的信息亭允许其用户访问特定于物理店面零售商的库存信息,而电子商务信息服务允许其用户从实体店面零售商的库存中订购商品。
    • 18. 发明授权
    • Scoring recommendations and explanations with a probabilistic user model
    • 用概率用户模型评分建议和解释
    • US08799096B1
    • 2014-08-05
    • US13176448
    • 2011-07-05
    • Thomas H. Dillon
    • Thomas H. Dillon
    • G06Q30/00
    • G06Q30/0631G06Q30/02G06Q30/06
    • A data processing system generates recommendations for on-line shopping by scoring recommendations matching the customer's cart contents using by assessing and ranking each candidate recommendation by the expected incremental margin associated with the recommendation being issued (as compared to the expected margin associated with the recommendation not being issued) by taking into consideration historical associations, knowledge of the layout of the site, the complexity of the product being sold, the user's session behavior, the quality of the selling point messages, product life cycle, substitutability, demographics and/or other considerations relating to the customer purchase environment. In an illustrative implementation, scoring inputs for each candidate recommendation (such as relevance, exposure, clarity and/or pitch strength) are included in a probabilistic framework (such as a Bayesian network) to score the effectiveness of the candidate recommendation and/or associated selling point messages by comparing a recommendation outcome (e.g., purchase likelihood or expected margin resulting from a given recommendation) against a non-recommendation outcome (e.g., the purchase likelihood or expected margin if no recommendation is issued). In addition, a probabilistic framework may also be used to select a selling point message for inclusion with a selected candidate recommendation by assessing the relative strength of the selling point messages by factoring in a user profile match factor (e.g., the relative likelihood that the customer matches the various user case profiles).
    • 数据处理系统通过对与客户购物车内容相匹配的建议进行评分,通过评估和排名每个候选人推荐与所推荐的建议相关联的预期增量保证金(与与该建议不相关的预期保证金相比较)来生成在线购物的建议 通过考虑历史协会,网站布局知识,被销售产品的复杂性,用户的会话行为,卖点消息的质量,产品生命周期,可替代性,人口统计和/或其他 与客户购买环境有关的考虑。 在说明性实现中,对于每个候选推荐(例如相关性,曝光,清晰度和/或音调强度)的评分输入被包括在概率框架(例如贝叶斯网络)中,以评估候选推荐的有效性和/或相关联 通过比较推荐结果(例如,由给定建议产生的购买可能性或预期保证金)与非推荐结果(例如,如果没有推荐推荐,购买可能性或预期保证金)进行比较。 此外,概率框架还可以用于通过通过考虑用户简档匹配因子(例如,客户的相对似然性)来评估卖点消息的相对强度来选择用于包含所选择的候选推荐的卖点消息 匹配各种用户案例配置文件)。
    • 19. 发明申请
    • Variable Domain Resource Data Security for Data Processing Systems
    • 数据处理系统的可变域资源数据安全
    • US20140208415A1
    • 2014-07-24
    • US14084270
    • 2013-11-19
    • Versata Development Group, Inc.
    • Jacy M. LegaultJon Loyens
    • G06F21/44
    • G06F21/6218G06F21/44G06F21/604G06F2221/2113H04L63/105
    • The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model.
    • 本文所述的可变域数据访问控制系统和方法使用相同的可变域来描述数据安全模型和诸如产品配置模型的可变域数据模型。 可变域是可以使用逻辑关系数据结构描述的一组资源数据。 可变域使用诸如布尔逻辑语言之类的逻辑关系表达式,以部件,规则和/或属性的方式定义资源数据,以及可以访问以查看,操作或其他目的的任何其他属性。 数据安全模型表示一个访问控制列表(ACL),其包括作为资源数据的安全属性,并且使用与相关联的可变域数据模型相同的数据结构和逻辑关系表达式。 可以使用应用程序(如配置引擎)使用数据安全模型来创建对可变域数据模型的受控访问。