The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A system for controlling access to electronic resources with no de-facto locking mechanism.
English (United States)
This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately
63% of the total text.
Page 1 of 1
A System or Method for Controlling Access of Work Requests Against Non -Lockable Heterogeneous Resources in a Stateless Environment
Disclosed is a system that allows for the control of access to heterogeneous electronic resources which do not have a de-facto method of locking their contents. This can include a common file system, e-mail box, single file with multiple entries, etc. It may be desirable for user-driven work to be controlled in such a way that you can avoid duplication of work items by controlling access to these common resources. Current systems of locking resources tend to be built directly into the application or resource that is being accessed. For example database systems will control access to data in tables or rows while it is being accessed by other users. This approach is limited in that it applies to only one type of resource, and the same locking mechanism could not be naturally expanded to other resources outside of the native application. Other solutions offer a client that can manage a specific resource (i.e. Email inbox) and allow status updates of the resource, but do not provide an actual lock of the resource. This approach fails in both protecting against duplication of work, and flexibility of application. Our solution focuses on the locking mechanism not being tightly integrated into the resource that is being a...