METHOD AND SYSTEM FOR DISTRIBUTED WORKFLOW MANAGEMENT

    公开(公告)号:JP2004005550A

    公开(公告)日:2004-01-08

    申请号:JP2003099974

    申请日:2003-04-03

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a method for managing a workflow by a workflow management system for managing the workflow portions of a distributed workflow. SOLUTION: This method for distributed workflow management comprises the steps of defining the common specifications of the distributed workflow used for the workflow management system, specifying by using the common workflow specifications what workflow management system takes charge of any workflow portion, generating each image of the distributed workflow in each workflow management system, and notifying one real workflow management system based on the common workflow specifications of the state of progress of the workflow portion managed by the workflow management system in the other organization. In the workflow management system which receives a notification, the display of the state of the progress on a distributed workflow image is updated together with the state of the progress of the workflow portion managed by the other real workflow management system. COPYRIGHT: (C)2004,JPO

    ACCESS CONTROL SYSTEM, KEYS, LOCKS AND INFORMATION PROPAGATING METHOD

    公开(公告)号:JP2000224163A

    公开(公告)日:2000-08-11

    申请号:JP2000009633

    申请日:2000-01-19

    Applicant: IBM

    Inventor: GUELCUE CEKI

    Abstract: PROBLEM TO BE SOLVED: To obtain a flexible and electronic lock and key system with high reliability, without requiring direct connection between locks and a management center linked with them by providing the plural locks and keys, providing a memory means in a part of the locks and keys and exchanging information between the locks and the keys. SOLUTION: Assume that DDAM 1 issues a message that a key 3d, for example, is not permitted to enter a room behind a door with the lock 2e. The message designated concerning the lock 2e 'enters' into a network via a line 5. When the lock 2a receives the message, each key used in the lock 2a receives a copy of the message at once and stores it in a memory part at that time. The key 3a transfers it to a lock 2b and the key 3b reads, stores and transfers it. It advances to the lock 2e which is the designated destination via the key 3c, the lock 2d, the key 3d or the key 3e or the like.

    3.
    发明专利
    未知

    公开(公告)号:DE69924349D1

    公开(公告)日:2005-04-28

    申请号:DE69924349

    申请日:1999-01-28

    Applicant: IBM

    Inventor: GUELCUE CEKI

    Abstract: Disclosed is a new and flexible approach for managing physical security in an electronic lock-and-key system. The novel approach does away with cabling or other direct connecting between locks (2) and a system management center (1). The (physical) keys (3) serve to disseminate access control and other information within the system in a snowball-like way, using an adapted, but simple networking protocol. Whenever appropiate, cryptographic schemes are applied to protect the system.

    4.
    发明专利
    未知

    公开(公告)号:DE69924349T2

    公开(公告)日:2006-02-09

    申请号:DE69924349

    申请日:1999-01-28

    Applicant: IBM

    Inventor: GUELCUE CEKI

    Abstract: Disclosed is a new and flexible approach for managing physical security in an electronic lock-and-key system. The novel approach does away with cabling or other direct connecting between locks (2) and a system management center (1). The (physical) keys (3) serve to disseminate access control and other information within the system in a snowball-like way, using an adapted, but simple networking protocol. Whenever appropiate, cryptographic schemes are applied to protect the system.

Patent Agency Ranking