METHOD AND SYSTEM FOR DYNAMIC ADJUSTMENT OF COMPUTER SECURITY BASED ON NETWORK ACTIVITY OF USERS
    1.
    发明申请
    METHOD AND SYSTEM FOR DYNAMIC ADJUSTMENT OF COMPUTER SECURITY BASED ON NETWORK ACTIVITY OF USERS 审中-公开
    基于用户网络活动的计算机安全动态调整方法与系统

    公开(公告)号:WO2007045554A2

    公开(公告)日:2007-04-26

    申请号:PCT/EP2006066996

    申请日:2006-10-03

    Abstract: A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.

    Abstract translation: 提出了一种用于在数据处理系统中保护计算资源的方法,系统,装置或计算机程序产品。 第一用户使用第一计算设备,并且用户安全级别与第一用户相关联。 类似地,第二用户使用第二计算设备,并且用户安全级别与第二用户相关联。 基于第二用户的第二用户安全级别自动重新配置第一计算设备上的计算资源。 可以将计算安全级别分配给第一计算设备上的计算资源,并且响应于由第二用户正在使用的第二计算设备的检测到的网络活动来动态地调整计算安全级别。 基于经调整的计算安全级别重新配置用于在第一计算设备上重新配置计算资源的修改的安全相关参数。

    Method and apparatus to organize file based on download location
    2.
    发明专利
    Method and apparatus to organize file based on download location 有权
    基于下载位置组织文件的方法和装置

    公开(公告)号:JP2008021308A

    公开(公告)日:2008-01-31

    申请号:JP2007176759

    申请日:2007-07-04

    CPC classification number: G06F17/30899 G06F17/30082

    Abstract: PROBLEM TO BE SOLVED: To provide a computer implemented method, apparatus and computer usable program for managing files. SOLUTION: A set of origination locations for a plurality of files is identified to form a set of identified origination locations in response to a request to view the plurality of files. Each origination location in the set of identified origination locations identifies a location from which a file in the plurality of files is received. A representation of the plurality of files is presented using a set of graphical indicators based on the set of identified original locations. COPYRIGHT: (C)2008,JPO&INPIT

    Abstract translation: 要解决的问题:提供用于管理文件的计算机实现的方法,装置和计算机可用程序。 解决方案:响应于查看多个文件的请求,识别多个文件的一组起始位置以形成一组识别的发起位置。 所识别的发起位置集合中的每个起始位置标识多个文件中的文件从哪个位置被接收的位置。 基于所识别的原始位置的集合,使用一组图形指示符来呈现多个文件的表示。 版权所有(C)2008,JPO&INPIT

    DEVICE AND METHOD FOR TRANSMITTING DEPTH INFORMATION IN GRAPHICAL IMAGE

    公开(公告)号:JP2002358540A

    公开(公告)日:2002-12-13

    申请号:JP2002073546

    申请日:2002-03-18

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a device and a method for transmitting the depth queue of an image in a Web page to a visually disabled user. SOLUTION: A first form provides, a depth queue method and comprises scanning a depth map corresponding to the image in response to a user input. A non-visual queue corresponding to the depth value of the depth map is outputted at each pixel. A second form provides a computer program product and comprises a program for scanning the depth map corresponding to the image in response to the user input so that the non-visual queue corresponding to the depth value of the depth map is outputted at each pixel. A third form provides a data processing system and comprises a circuit for scanning the depth map and a circuit for outputting the non-visual queue corresponding to the depth value of the depth map. The non-visual queue is outputted at each pixel.

    METHOD AND APPARATUS FOR EMERGENCY NOTIFICATION
    4.
    发明申请
    METHOD AND APPARATUS FOR EMERGENCY NOTIFICATION 审中-公开
    紧急通报的方法和装置

    公开(公告)号:WO02078226A3

    公开(公告)日:2003-03-27

    申请号:PCT/US0148893

    申请日:2001-12-17

    Applicant: IBM

    Abstract: A portable apparatus (120) includes telecommunications circuitry (375) operable to communicate on a wireless carrier system, and a slave device (470) coupled to the telecommunications circuitry. The slave device (470) is operable to: receive a close-range, standard-protocol signal notification (440) from a master device (430) affixed to a vehicle, and trigger the telecommunications circuitry (375) to transmit to the wireless carrier system notification of an emergency event. The emergency event includes a change above a certain threshold magnitude of speed of the vehicle, a change above a certain threshold magnitude of acceleration of the vehicle, a change above a certain threshold magnitude of rate of acceleration of the vehicle, or deployment of an air bag.

    Abstract translation: 便携式设备(120)包括可操作以在无线载波系统上通信的电信电路(375)和耦合到电信电路的从设备(470)。 从设备(470)可操作以:从附加到车辆的主设备(430)接收近距离的标准协议信号通知(440),并触发电信电路(375)向无线载波 系统通知紧急事件。 紧急事件包括高于车辆速度的某个阈值幅度的变化,高于车辆加速度的某个阈值幅度的变化,高于车辆加速度的某个阈值幅度的变化或空气展开 袋。

    METHOD AND SYSTEM FOR DYNAMIC ADJUSTMENT OF COMPUTER SECURITY BASED ON NETWORK ACTIVITY OF USERS

    公开(公告)号:CA2625718C

    公开(公告)日:2015-04-21

    申请号:CA2625718

    申请日:2006-10-03

    Applicant: IBM

    Abstract: A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.

    6.
    发明专利
    未知

    公开(公告)号:DE602004008776T2

    公开(公告)日:2008-06-12

    申请号:DE602004008776

    申请日:2004-06-11

    Applicant: IBM

    Abstract: A system and method for using semantic analysis to configure a voice reader is presented. A text file includes a plurality of text blocks, such as paragraphs. Processing performs semantic analysis on each text block in order to match the text block's semantic content with a semantic identifier. Once processing matches a semantic identifier with the text block, processing retrieves voice attributes that correspond to the semantic identifier (i.e. pitch value, loudness value, and pace value) and provides the voice attributes to a voice reader. The voice reader uses the text block to produce a synthesized voice signal with properties that correspond to the voice attributes. The text block may include semantic tags whereby processing performs latent semantic indexing on the semantic tags in order to match semantic identifiers to the semantic tags.

    METHOD AND SYSTEM FOR DYNAMIC ADJUSTMENT OF COMPUTER SECURITY BASED ON NETWORK ACTIVITY OF USERS

    公开(公告)号:CA2625718A1

    公开(公告)日:2007-04-26

    申请号:CA2625718

    申请日:2006-10-03

    Applicant: IBM

    Abstract: A method, system, apparatus, or computer program product is presented for securing computational resources in a data processing system. A first user uses a first computational device, and a user security level is associated with the first user. Likewise, a second user uses a second computational device, and a user security level is associated with the second user. The computational resources on the first computational device are automatically reconfigured based on the second user security level of the second user. A computational security level may be assigned to a computational resource on the first computational device, and the computational security level is dynamically adjusted in response to detected network activity by the second computational device that is being used by the second user. Modified security-related parameters for reconfiguring computational resources on the first computational device are reconfigured based on the adjusted computational security level.

    METHOD AND APPARATUS FOR EMERGENCY NOTIFICATION

    公开(公告)号:PL364572A1

    公开(公告)日:2004-12-13

    申请号:PL36457201

    申请日:2001-12-17

    Applicant: IBM

    Abstract: A portable apparatus includes telecommunications circuitry operable to communicate on a wireless carrier system, and a slave device coupled to the telecommunications circuitry. The slave device is operable to i) receive a close-range, standard-protocol radio signal notification from a master device affixed to a vehicle, and ii) trigger the telecommunications circuitry to transmit a wireless carrier system notification of the event. The emergency event includes a change above a certain threshold magnitude of speed of the vehicle, a change above a certain threshold magnitude of acceleration of the vehicle, a change above a certain threshold magnitude of rate of acceleration of the vehicle, or deployment of an air bag.

    Active alt tag in html documents to increase the accessibility to users with visual, audio impairment

    公开(公告)号:AU2002231980A1

    公开(公告)日:2002-10-28

    申请号:AU2002231980

    申请日:2002-02-14

    Applicant: IBM

    Abstract: A method, program and system for providing access to alternate formats within an electronic document are provided. The invention comprises parsing a web page and creating a document object model (DOM), and then parsing the alternate format attribute of an image element within the DOM. The browser then displays the web page containing an image (or images) according to the default settings of the browser. A user interface is specified which allows the user to select alternate formats for the default image. This user interface may be in the form of a pop up menu that is presented to the user in response to an input command, such as a right mouse click on the default image. The user can then select an alternate format which replaces the original image in the web page. Alternate formats may include text, audio, or tactile formats.

    Method and apparatus for emergency notification

    公开(公告)号:AU2002246692A1

    公开(公告)日:2002-10-08

    申请号:AU2002246692

    申请日:2001-12-17

    Applicant: IBM

    Abstract: A portable apparatus includes telecommunications circuitry operable to communicate on a wireless carrier system, and a slave device coupled to the telecommunications circuitry. The slave device is operable to i) receive a close-range, standard-protocol radio signal notification from a master device affixed to a vehicle, and ii) trigger the telecommunications circuitry to transmit a wireless carrier system notification of the event. The emergency event includes a change above a certain threshold magnitude of speed of the vehicle, a change above a certain threshold magnitude of acceleration of the vehicle, a change above a certain threshold magnitude of rate of acceleration of the vehicle, or deployment of an air bag.

Patent Agency Ranking