The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
This article outlines an approach that utilizes B2B Service negotiation for security and qualities of service.
English (United States)
This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately
75% of the total text.
Page 1 of 2
Utilizing B2B Service Negotiation for Security and Qualities of Service
This article outlines an approach that utilizes B2B Service negotiation for security and qualities of service. The system negotiates a session over the Internet Protocol and through that negotiation, is able to understand the path which the data will travel through the network and adjust the qualities of service and security based on that path and based on Service Level Agreements (SLA).
The system will look up the service in a service registry. The component of the system utilizing the registry to look up the service will use a well known protocol, such as SIP, to negotiate the session between itself and the service. The session itself will be of another protocol such as SOAP over HTTP. This negotiation allows the service to further understand the path of the data flowing on the network. The service will have information about the component, such as the name of the component or business interacting with the component. The service will be able to look-up the SLA based on the information about the component mentioned previously. Based on the negotiation path, the service will adjust the initial qualities of service and security the component receives. For example, If the path went purely through its own network, a lower encryption level may be utilized than if the data flowe...