会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 9. 发明申请
    • Automated Model Generation For Computer Based Business Process
    • 基于计算机的业务流程的自动模型生成
    • US20100280863A1
    • 2010-11-04
    • US12808227
    • 2007-12-20
    • Lawrence WilcockNigel EdwardsSven GraupnerJerome RoliaBryan Stephenson
    • Lawrence WilcockNigel EdwardsSven GraupnerJerome RoliaBryan Stephenson
    • G06Q10/00
    • G06Q10/00G06Q10/063G06Q10/067
    • A system for generating a model representing an existing computer based business process involves analysing existing source content (910) which has annotations (920) added, to provide information for the modelling. Static analysis of the annotations can provide some of the information. Other information can be discovered at run time if the annotations alter the run time behaviour to generate monitoring events showing the behaviour. The annotations need not be restricted to codes or symbols or structures of the language of the source content, and can use concepts closer to those in the model being generated. Using annotations rather than manual modelling can reduce errors and lead to better predictions of performance from the model, and result in better reconfiguration of the software or the computing infrastructure to make more efficient usage of shared resources.
    • 用于生成表示现有基于计算机的业务流程的模型的系统涉及分析具有添加注释(920)的现有源内容(910),以提供用于建模的信息。 注释的静态分析可以提供一些信息。 如果注释更改运行时行为以生成显示行为的监视事件,则可以在运行时发现其他信息。 注释不必限于源内容的语言的代码或符号或结构,并且可以使用更接近正在生成的模型中的概念。 使用注释而不是手动建模可以减少错误,从而更好地预测模型的性能,并导致更好地重新配置软件或计算基础设施,以更有效地使用共享资源。
    • 10. 发明申请
    • Method and system for responding to network intrusions
    • 响应网络入侵的方法和系统
    • US20050076236A1
    • 2005-04-07
    • US10678333
    • 2003-10-03
    • Bryan Stephenson
    • Bryan Stephenson
    • G06F21/00H04L12/24H04L29/06G06F11/30
    • H04L41/28G06F21/55G06F21/554H04L63/1408H04L63/1441
    • A method and system for responding to network intrusions. Specifically, in one embodiment, the method begins by receiving an intrusion detection system (IDS) alert from an IDS sensor located in a network of computing resources. The IDS alert indicates an unauthorized intrusion upon a remotely located computing resource in the network of computing resources. The embodiment of the method continues by identifying the IDS alert. Then, the embodiment continues by determining an appropriate response to the IDS alert that is identified at a location separate from the remotely located computing resource so that the appropriate response is unaffected by the unauthorized intrusion. The embodiment of the method automatically implements the appropriate response to mitigate damage to the network of computing resources from the unauthorized intrusion.
    • 一种响应网络入侵的方法和系统。 具体地说,在一个实施例中,该方法开始于从位于计算资源网络中的IDS传感器接收入侵检测系统(IDS)警报。 IDS警报表示对计算资源网络中位于远程计算资源的未经授权的入侵。 该方法的实施例通过识别IDS警报而继续。 然后,该实施例通过确定在与远程位置的计算资源分离的位置处识别的IDS警报的适当响应来继续,使得适当的响应不受未经授权的入侵的影响。 该方法的实施例自动地实现适当的响应,以减轻来自未经授权的入侵对计算资源的网络的损坏。