会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Splitting avatars in a virtual world
    • 在虚拟世界中分裂化身
    • US08850342B2
    • 2014-09-30
    • US12629666
    • 2009-12-02
    • Lisa Seacat DeLucaMartin Oberhofer
    • Lisa Seacat DeLucaMartin Oberhofer
    • G06F3/048A63F13/40A63F13/30
    • A63F13/63A63F13/10A63F13/12A63F13/42A63F2300/5533A63F2300/5553
    • Systems, methods and articles of manufacture are disclosed for splitting an avatar a split point in a virtual world. In one embodiment, a location in the virtual world may be designated as the split point. It may be determined that a first avatar has encountered the split point. The user may be prompted to specify whether to split the first avatar in a virtual world. Responsive to a request to split the first avatar, a second avatar may be created from the first avatar. The first avatar and the second avatar may be controlled independently in the virtual world and in response to user input. A user may also request to merge the first avatar and the second avatar. A third avatar may be created from the first avatar and the second avatar, responsive to the request to merge. The third avatar may include assets of both the first avatar and the second avatar.
    • 公开了用于将虚拟世界中的分割点分割为化身的系统,方法和制品。 在一个实施例中,虚拟世界中的位置可以被指定为分割点。 可以确定第一化身已经遇到分割点。 可以提示用户指定是否在虚拟世界中分割第一化身。 响应于分割第一化身的请求,可以从第一化身创建第二化身。 第一化身和第二化身可以在虚拟世界中独立地控制并且响应于用户输入。 用户还可以请求合并第一化身和第二化身。 响应于合并请求,可以从第一头像和第二头像创建第三化身。 第三化身可以包括第一化身和第二化身的资产。
    • 6. 发明授权
    • Identity mediation in enterprise service bus
    • 企业服务总线中的身份调解
    • US08613043B2
    • 2013-12-17
    • US13413638
    • 2012-03-06
    • Dmitriy FotIvan MilmanMartin Oberhofer
    • Dmitriy FotIvan MilmanMartin Oberhofer
    • H04L29/06
    • H04L63/102H04L63/20
    • A method for identity mediation in an enterprise service bus is provided in the illustrative embodiments. A security information is received at the enterprise service bus from a first application executing in a first data processing system. The security information is a part of a request for service from a second application executing in a second data processing system. A part of the security information is identified to be transformed such that the part upon transformation is usable for handling the request by the second application. A security policy applicable to the identified part is selected and the identified part is transformed according to the security policy. The transforming results in a transformed security information. The transformed security information is sent to the second application.
    • 在说明性实施例中提供了企业服务总线中的身份中介的方法。 从在第一数据处理系统中执行的第一应用程序在企业服务总线接收安全信息。 安全信息是来自在第二数据处理系统中执行的第二应用程序的服务请求的一部分。 识别安全信息的一部分被变换,使得转换后的部分可用于处理第二应用的请求。 选择适用于识别的部分的安全策略,并根据安全策略转换已识别的部分。 转型导致转换的安全信息。 已转换的安全信息被发送到第二个应用程序。
    • 7. 发明申请
    • Determination of Rules by Providing Data Records in Columnar Data Structures
    • 通过在列数据结构中提供数据记录来确定规则
    • US20120310874A1
    • 2012-12-06
    • US13465210
    • 2012-05-07
    • Patrick DantressangleEberhard HechlerMartin OberhoferMichael Wurst
    • Patrick DantressangleEberhard HechlerMartin OberhoferMichael Wurst
    • G06F17/30
    • G06F17/30321G06F17/30315
    • A method includes providing a columnar database comprising a plurality of columnar data structures associated with one column attribute; providing first data records having a plurality of first attribute-value pairs comprising counting information indicative of a number of first data records having the respective first attribute-value pair; providing mask data structures comprising one or more second attribute-value pairs; selecting second data records by intersecting the columnar data structures and the mask data structures; selecting one of the column attributes and one value contained in the column data structure associated with said selected column attribute as the destination attribute-value pair; creating one second rule for each first attribute-value pair; calculating, for each second rule, a co-occurrence-count between its respective source attribute-value pair and its destination attribute-value pair; and specifically selecting one or more of said second rules as the first rules in dependence on the calculated co-occurrence-count.
    • 一种方法包括提供一个包括与一个列属性相关联的多个列数据结构的列数据库; 提供具有多个第一属性值对的第一数据记录,所述第一属性值对包括表示具有相应的第一属性值对的第一数据记录的数量的计数信息; 提供包括一个或多个第二属性值对的掩码数据结构; 通过与列数据结构和掩模数据结构相交来选择第二数据记录; 选择所述列属性之一和包含在与所述列列属性相关联的列数据结构中的一个值作为目标属性值对; 为每个第一个属性值对创建一个第二个规则; 对于每个第二规则,计算其各自的源属性值对与其目的地属性值对之间的共同计数; 并且具体地根据所计算的同现计数来选择所述第二规则中的一个或多个作为第一规则。
    • 9. 发明申请
    • IDENTITY MEDIATION IN ENTERPRISE SERVICE BUS
    • 企业服务总线中的身份识别
    • US20110154435A1
    • 2011-06-23
    • US12644072
    • 2009-12-22
    • Dimitriy FotIvan MilmanMartin Oberhofer
    • Dimitriy FotIvan MilmanMartin Oberhofer
    • G06F17/00
    • H04L63/102H04L63/20
    • A method, system, and computer usable program product for identity mediation in an enterprise service bus are provided in the illustrative embodiments. A security information is received at the enterprise service bus from a first application executing in a first data processing system. The security information is a part of a request for service from a second application executing in a second data processing system. A part of the security information is identified to be transformed such that the part upon transformation is usable for handling the request by the second application. A security policy applicable to the identified part is selected and the identified part is transformed according to the security policy. The transforming results in a transformed security information. The transformed security information is sent to the second application.
    • 在说明性实施例中提供了用于企业服务总线中的身份中介的方法,系统和计算机可用程序产品。 从在第一数据处理系统中执行的第一应用程序在企业服务总线接收安全信息。 安全信息是来自在第二数据处理系统中执行的第二应用程序的服务请求的一部分。 识别安全信息的一部分被变换,使得转换后的部分可用于处理第二应用的请求。 选择适用于识别的部分的安全策略,并根据安全策略转换已识别的部分。 转型导致转换的安全信息。 已转换的安全信息被发送到第二个应用程序。
    • 10. 发明申请
    • METHOD AND SYSTEM FOR TURNING VIRTUAL WORLD PARTICIPANTS INTO REAL LIFE LEADS
    • 将虚拟世界参与者引入真实生活领域的方法和系统
    • US20100185510A1
    • 2010-07-22
    • US12357514
    • 2009-01-22
    • Albert MaierDirk NowakMartin OberhoferThomas SchwarzBaxter R. Yazbek
    • Albert MaierDirk NowakMartin OberhoferThomas SchwarzBaxter R. Yazbek
    • G06Q30/00
    • G06Q30/02G06Q30/0251
    • The present disclosure details a method and system used for turning human participants who control avatars in a virtual world setting into real life marketing leads. In one embodiment, a virtual location is presented within a virtual world to facilitate interaction with an avatar. The avatar is identified within a master data management system, and a profile of the human behind the avatar is created or retrieved. To encourage the human user to provide real-world information through the avatar within the virtual world, an incentive is offered and awarded as necessary. The real-world information about the human user, such as address or demographic information about the human user is collected and stored in the profile, and eventually synchronized with a CRM system. As appropriate, the data collected and compiled in the CRM system may be used to launch marketing campaigns.
    • 本公开详细描述了用于将控制虚拟世界中的化身的人类参与者变成现实生活营销线索的方法和系统。 在一个实施例中,在虚拟世界中呈现虚拟位置以促进与化身的交互。 在主数据管理系统内识别化身,并且创建或检索人物后面的人物的简档。 为了鼓励人类用户通过虚拟世界中的化身提供真实世界的信息,必要时提供奖励并颁发奖励。 关于人类用户的真实世界信息(例如关于人类用户的地址或人口统计信息)被收集并存储在简档中,并且最终与CRM系统同步。 在CRM系统中收集和编译的数据也可以适用于开展营销活动。