Modelling Computer Based Business Process For Customisation And Delivery
    1.
    发明申请
    Modelling Computer Based Business Process For Customisation And Delivery 审中-公开
    基于计算机的业务流程建模定制和交付

    公开(公告)号:US20110004565A1

    公开(公告)日:2011-01-06

    申请号:US12808231

    申请日:2007-12-20

    IPC分类号: G06Q99/00 G06Q10/00

    摘要: A modelling system to provide a computer based business process for an enterprise, allows the enterprise to input values for a plurality of non functional requirements (760) for the deployment, and allows at least some of the values to be varied independently of others of the values, and creates a design of software application components (770) and a design of computing infrastructure (780), for running the software application components, so that the business process operates according to the values input for the non functional requirements of the business process. By modelling the underlying computing infrastructure, it becomes feasible to create models with greater certainty that they will deploy successfully, and with greater predictability of how well they will meet given non functional requirements. This enables more freedom to be allowed to vary the values of these non functional requirements and get greater customisation to suit the needs of the enterprise.

    摘要翻译: 为企业提供基于计算机的业务流程的建模系统允许企业输入用于部署的多个非功能需求(760)的值,并允许至少一些值独立于其他 值,并创建软件应用程序组件(770)的设计和计算基础架构(780)的设计,用于运行软件应用程序组件,以便业务流程根据为业务流程的非功能需求输入的值进行操作 。 通过对底层计算基础架构进行建模,可以更准确地创建模型,以便他们能够成功部署,并以更好的可预测性来满足给定的非功能需求。 这样可以允许更多的自由来改变这些非功能需求的价值,并获得更多的定制以满足企业的需求。

    ARTIFICIAL RECORD ADDED TO A DATABASE
    2.
    发明申请
    ARTIFICIAL RECORD ADDED TO A DATABASE 有权
    人工记录添加到数据库

    公开(公告)号:US20100281069A1

    公开(公告)日:2010-11-04

    申请号:US12433791

    申请日:2009-04-30

    IPC分类号: G06F7/00 G06F12/00

    摘要: A method comprises receiving a database containing records. The method further comprises determining a number of artificial records to add to the database to achieve a false negative mark detection rate less than a specified threshold. The method also comprises marking the database by adding the determined number of artificial records to the database. Each artificial record contains at least one value that, when used, is detectable by a third party. The false negative rate comprises a probability of failing to detect the mark in a discovered subset of the database.

    摘要翻译: 一种方法包括接收包含记录的数据库。 该方法还包括确定要添加到数据库中的人造记录的数量,以获得小于指定阈值的假阴性标记检测率。 该方法还包括通过将确定数量的人造记录添加到数据库来标记数据库。 每个人工记录包含至少一个值,当使用时,它可被第三方检测到。 假阴性率包括在数据库的发现子集中检测不到标记的概率。

    Modelling Computer Based Business Process And Simulating Operation
    3.
    发明申请
    Modelling Computer Based Business Process And Simulating Operation 审中-公开
    基于计算机的业务流程和模拟操作建模

    公开(公告)号:US20100262559A1

    公开(公告)日:2010-10-14

    申请号:US12808233

    申请日:2007-12-20

    IPC分类号: G06Q10/00

    CPC分类号: G06Q10/00 G06Q10/067

    摘要: Modelling a computer based business process having a number of functional steps, involves providing software candidate models (740) of the business process, each specifying the functional steps (750), an arrangement of software application components (770) for carrying out the functional steps, and a design of computing infrastructure (780), for running the software application components, to meet given non functional requirements, and suitable for automated deployment. For each of the candidate models, operation of the business process is simulated (730) according to the respective candidate model and their simulated operation is evaluated against the non-functional requirements. The simulation can help the search for a suitable or optimum deployment to be more efficient and can lead to more efficient usage of shared resources.

    摘要翻译: 建模具有多个功能步骤的基于计算机的业务流程,涉及提供业务流程的软件候选模型(740),每一个指定功能步骤(750),用于执行功能步骤的软件应用组件(770)的布置 ,以及运行软件应用程序组件的计算基础设施(780)设计,以满足给定的非功能需求,并适用于自动化部署。 对于每个候选模型,根据相应的候选模型模拟业务流程的操作(730),并根据非功能需求对其模拟操作进行评估。 该仿真可以帮助搜索合适或最佳的部署更有效率,并可以更有效地使用共享资源。

    Incorporating Development Tools In System For Deploying Computer Based Process On Shared Infrastructure
    4.
    发明申请
    Incorporating Development Tools In System For Deploying Computer Based Process On Shared Infrastructure 审中-公开
    将开发工具集成在共享基础架构上部署基于计算机的流程的系统中

    公开(公告)号:US20100262558A1

    公开(公告)日:2010-10-14

    申请号:US12808223

    申请日:2007-12-20

    IPC分类号: G06Q10/00 G06F9/44

    CPC分类号: G06Q10/00 G06Q10/067

    摘要: A method of setting up a development environment for development work on a computer based business process, involves providing a software model (827) of the business process, and providing in the model a representation (870) of tools for developing part of the process, incorporated with the corresponding part of the modelled business process. The selected parts of the model incorporating the tools are deployed, and the given tools installed, to set up the development environment. By modelling the development tools incorporated in the business process, setting up the development environment can be made easier. Choice and arrangement of tools needs less manual input, so risks of errors, and time spent in setting up can be reduced.

    摘要翻译: 在计算机业务流程中建立开发工作的开发环境的方法涉及提供业务流程的软件模型(827),并在模型中提供用于开发部分流程的工具的表示(870) 并入相关部分的建模业务流程。 部署包含工具的模型的所选部分,并安装给定的工具,以建立开发环境。 通过对业务流程中并入的开发工具进行建模,可以更轻松地设置开发环境。 工具的选择和安排需要较少的手动输入,因此可以减少错误风险和设置所花费的时间。

    CONFIGURING PROCESS VARIANTS FOR ON-BOARDING CUSTOMERS FOR INFORMATION TECHNOLOGY (IT) OUTSOURCING
    6.
    发明申请
    CONFIGURING PROCESS VARIANTS FOR ON-BOARDING CUSTOMERS FOR INFORMATION TECHNOLOGY (IT) OUTSOURCING 审中-公开
    用于信息技术(IT)外包的客户的配置过程变量

    公开(公告)号:US20130346339A1

    公开(公告)日:2013-12-26

    申请号:US13531198

    申请日:2012-06-22

    IPC分类号: G06Q10/06

    CPC分类号: G06Q10/06

    摘要: Systems and methods of configuring process variants for on-boarding customers for information technology (IT) outsourcing are provided. An example method includes modeling roles, responsibilities, and business context for a standard process template. The method also includes developing cause-and-effect rules affecting outcome of the standard process template. The method also includes adjusting the standard process template for process variants across different customer on-boarding scenarios.

    摘要翻译: 提供了为信息技术(IT)外包的上班客户配置流程变体的系统和方法。 示例方法包括为标准流程模板建模角色,职责和业务上下文。 该方法还包括制定影响标准流程模板结果的因果关系规则。 该方法还包括调整不同客户登机场景下流程变体的标准流程模板。

    Fingerprinting a database
    7.
    发明授权
    Fingerprinting a database 有权
    指纹数据库

    公开(公告)号:US08296342B2

    公开(公告)日:2012-10-23

    申请号:US12551402

    申请日:2009-08-31

    IPC分类号: G06F17/30 G06F17/00

    CPC分类号: G06F17/30595 G06F21/64

    摘要: A method comprising fingerprinting, by the at least one processor, a first copy of a database with a fingerprint. The fingerprint has at least one part in common with another fingerprint used in another copy of the database, and at least one part unique to the first copy of the database. The fingerprinting comprises swapping attributes between multiple records in the first copy of the database.

    摘要翻译: 一种方法,包括由所述至少一个处理器用指纹指纹化数据库的第一副本。 指纹与数据库的另一个副本中使用的另一个指纹至少有一部分共同,以及数据库的第一个副本唯一的至少一个部分。 指纹包括在数据库的第一个副本中的多个记录之间交换属性。

    FINGERPRINTING A DATABASE
    8.
    发明申请
    FINGERPRINTING A DATABASE 有权
    指纹数据库

    公开(公告)号:US20110055166A1

    公开(公告)日:2011-03-03

    申请号:US12551402

    申请日:2009-08-31

    IPC分类号: G06F12/00

    CPC分类号: G06F17/30595 G06F21/64

    摘要: A method comprising fingerprinting, by the at least one processor, a first copy of a database with a fingerprint. The fingerprint has at least one part in common with another fingerprint used in another copy of the database, and at least one part unique to the first copy of the database. The fingerprinting comprises swapping attributes between multiple records in the first copy of the database.

    摘要翻译: 一种方法,包括由所述至少一个处理器用指纹指纹化数据库的第一副本。 指纹与数据库的另一个副本中使用的另一个指纹至少有一部分共同,以及数据库的第一个副本唯一的至少一个部分。 指纹包括在数据库的第一个副本中的多个记录之间交换属性。

    Automated Model Generation For Computer Based Business Process
    9.
    发明申请
    Automated Model Generation For Computer Based Business Process 审中-公开
    基于计算机的业务流程的自动模型生成

    公开(公告)号:US20100280863A1

    公开(公告)日:2010-11-04

    申请号:US12808227

    申请日:2007-12-20

    IPC分类号: G06Q10/00

    摘要: A system for generating a model representing an existing computer based business process involves analysing existing source content (910) which has annotations (920) added, to provide information for the modelling. Static analysis of the annotations can provide some of the information. Other information can be discovered at run time if the annotations alter the run time behaviour to generate monitoring events showing the behaviour. The annotations need not be restricted to codes or symbols or structures of the language of the source content, and can use concepts closer to those in the model being generated. Using annotations rather than manual modelling can reduce errors and lead to better predictions of performance from the model, and result in better reconfiguration of the software or the computing infrastructure to make more efficient usage of shared resources.

    摘要翻译: 用于生成表示现有基于计算机的业务流程的模型的系统涉及分析具有添加注释(920)的现有源内容(910),以提供用于建模的信息。 注释的静态分析可以提供一些信息。 如果注释更改运行时行为以生成显示行为的监视事件,则可以在运行时发现其他信息。 注释不必限于源内容的语言的代码或符号或结构,并且可以使用更接近正在生成的模型中的概念。 使用注释而不是手动建模可以减少错误,从而更好地预测模型的性能,并导致更好地重新配置软件或计算基础设施,以更有效地使用共享资源。

    Method and system for responding to network intrusions
    10.
    发明申请
    Method and system for responding to network intrusions 审中-公开
    响应网络入侵的方法和系统

    公开(公告)号:US20050076236A1

    公开(公告)日:2005-04-07

    申请号:US10678333

    申请日:2003-10-03

    申请人: Bryan Stephenson

    发明人: Bryan Stephenson

    摘要: A method and system for responding to network intrusions. Specifically, in one embodiment, the method begins by receiving an intrusion detection system (IDS) alert from an IDS sensor located in a network of computing resources. The IDS alert indicates an unauthorized intrusion upon a remotely located computing resource in the network of computing resources. The embodiment of the method continues by identifying the IDS alert. Then, the embodiment continues by determining an appropriate response to the IDS alert that is identified at a location separate from the remotely located computing resource so that the appropriate response is unaffected by the unauthorized intrusion. The embodiment of the method automatically implements the appropriate response to mitigate damage to the network of computing resources from the unauthorized intrusion.

    摘要翻译: 一种响应网络入侵的方法和系统。 具体地说,在一个实施例中,该方法开始于从位于计算资源网络中的IDS传感器接收入侵检测系统(IDS)警报。 IDS警报表示对计算资源网络中位于远程计算资源的未经授权的入侵。 该方法的实施例通过识别IDS警报而继续。 然后,该实施例通过确定在与远程位置的计算资源分离的位置处识别的IDS警报的适当响应来继续,使得适当的响应不受未经授权的入侵的影响。 该方法的实施例自动地实现适当的响应,以减轻来自未经授权的入侵对计算资源的网络的损坏。