专利摘要:

公开号:BE1020919A4
申请号:E201300313
申请日:2013-05-08
公开日:2014-09-02
发明作者:
申请人:Combell Group Nv;
IPC主号:
专利说明:

Title: Application for efficiently configuring and managing an IT system for information society services A. Description A.l. Technical domain
The present invention relates to an IT system for an efficient installation and management of IT infrastructures, platforms, applications, processes and data which are made available to users via a physical, virtual or wireless network.
In particular, it concerns a specific arrangement of a hosting environment, which is counted among the "information society services".
Such services are often defined as "services provided remotely, usually for a fee, using electronic means for data processing and storage, following an individual request". Reference is made here inter alia to the general and specific definitions contained in Directive 2000/31 / EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in internal market.
A.2. Background Art 1. To date, most of the internet-based applications are installed and data stored on a computer connected to an internal network and / or to the internet, from where they are made accessible to and made available to all or certain users of these applications and data. In most cases this concerns one or a limited number of physical machines that is or are capable of controlling or managing various applications and processes.
2. Various applications and processes are usually housed and controlled from these physical machines (commonly referred to as "servers"), such as receiving, storing and sending e-mails, storing and making websites available, etc. In both examples, separate software applications are installed on one physical machine (in this case, both a mail server and a Web server) that must be individually configured, managed and maintained by the administrator (s) of the installed applications.
3. These physical machines can be owned by a company that specializes in providing such data and applications (a so-called "hosting company"). If the machines are also the property of the owner of the data and the applications, but are located at a hosting company because of the fact that it has a suitable environment, this is called "housing".
4. In order to be able to easily locate and assign the data and the applications made available via the network to the owner [and users] thereof, this data and applications, both of which can be intrinsically different in nature, are often placed on a single machine.
5. Such an arrangement intrinsically entails a number of significant limitations and risks, including: [i) the failure of the physical machine automatically means that the various software applications, processes and data are no longer made available to users , and in the worst case are even permanently lost. Such failures can be the result of a technical problem inside the machine itself, or an external factor such as fire, power outages, etc .;
For such situations or incidents, different solutions are traditionally possible, which entail all technical difficulties, human intervention and increased costs: making backup copies (so-called backups) of the applications and data installed on the physical machine at different times or made available, which should be placed on another physical server in the event of the failure of the physical server, and thus be made available again to users. This solution has several disadvantages: the data must be copied at repeated times; the copies must be kept at a different location; if the physical machine fails, the last backups must be retrieved and installed on a new physical machine to be configured such as the initial physical machine, etc.
Such acts also entail intrinsically that additional costs must be incurred by the manager or owner of the server no longer functioning, the temporary unavailability of potentially critical applications and data for users, and in most cases also the loss of the latter version of this data (namely those that were created since the creation of the last backup).
Another possible solution is to permanently have another physical machine available at a different location that always has a complete copy of the applications, processes and data made available on the initial server.
It goes without saying that such an arrangement may entail considerable additional costs for the owner or manager of these servers, since it is not only necessary to invest in one but in two or even several physical machines, the purchase of multiple applications licenses and the provided with a permanent network connection between the different servers. Ideally, these physical machines should also be placed at different physical locations, to cope with the impact of major disasters (eg devastating company fire).
(ii) Since the physical server must be connected to the Internet or to another network in order to perform the above-mentioned tasks, the failure of the network connection also results in the applications, processes and data available on the Web server - albeit temporarily , until the time when the connection is restored - no longer available to users.
Hence also the reason why the different physical servers are connected to different information society service providers, and in particular those companies that provide access to the internet or install and make private networks available to users, which also entails significant additional costs for the owner or managers of the servers; 6. In all cases mentioned above, the owner or managers of the various physical machines / servers must be responsible for the installation, configuration and permanent management of not only the physical machines (eg the replacement of network connections, hard disks, memory modules, edm) but also the software applications, processes and data that are installed on the machines and made available to users. This often implies - in particular for business-critical applications - the need for permanent personnel to be able to carry out technical interventions (at both hardware and software level). In addition, such personnel must always be aware of the latest developments in hardware, applications and processes offered by the service providers, but at the same time they must continue to support potentially outdated technology purchased by users.
7. The ubiquitous availability of high-capacity networks, the fact that costs for computers and storage devices are coming under increasing pressure, as well as the widespread introduction of virtualization of hardware, IT-based architecture, autonomous and utility computing to a huge growth in cloud computing.
8. This virtualization means that keeping an IT system (platform, applications, processes and data) available does not depend on being available to a single physical machine (server), but that tasks are divided between different physical machines.
In this way the so-called "single point of failure" risk is taken care of: in such a case the failure of the machine on which all platforms, applications, processes and data are housed would result in none of these elements being accessible anymore .
9. In autonomous computing (or "autonomy computing"), system administrators install applications on the various physical machines, allowing these machines to autonomously manage the various components required for the processes being monitored (e.g., storage space, connectivity, processor capacity, computer memory) In this way, these different processes and sources can be used in a more efficient way.
10. Utility computing involves the provision of various IT services as individual products, whereby users do not pay for hardware, but only for the actual sources that they use. Hereby, customers of such service packages are paid for the processes and resources that are used, rather than for (the rent of) physical machines. Utility computing therefore formed the basis on which cloud computing was developed.
11. The evolution that cloud computing has entailed therefore essentially involves the virtualization of physical equipment, network connectivity and software applications and processes, as well as data that can be created, consulted and modified with the help of these applications and processes. In the context of cloud computing, the various applications, processes and data are not hosted or controlled on a single server, but on different (physical) servers.
12. These physical servers are housed in a network that is therefore configured to make decisions on the basis of the demand for specific data or processes regarding the number of locations where this data is stored, the number of copies made of this data, and the way in which this data is made available. For example, a data file that is frequently consulted (but not modified) will be made available on different physical machines in the network.
13. In cloud computing there are also different variants on the same theme: - software as a service / software as a service (abbreviated as "SaaS"): applications are made available to the end user in a virtualized way; - IT platforms as a service / platforms as a service (abbreviated as "PaaS"): this service allows application providers in a virtualized environment to offer these applications on separate and / or different platforms, whereby functions and functionalities that belong to the infrastructure level, such as user identification, identity management, portal functionalities and integration facilities with software and / or hardware under the control or management of the user; - infrastructure as a service / infrastructure as a service (abbreviated as "IaaS"): with this, service providers offer the management of servers, networks, storage capacity and other IT structures as a service, in most cases together with IT platforms and / or software as a service.
14. Consequently, any preparation of an information society service involving the management and making available of data requires a distinction to be made between the above three elements in the service, usually referring to "layers": an infrastructure layer , a platform layer, and an application layer.
15. In the first place, the service provider must make a choice about which infrastructure he or she offers. This is often a combination of hardware (servers, network connections, etc.) and software that is installed and configured on this hardware. The choice of the infrastructure often determines the choice of the platform to be placed on top of this infrastructure.
16. The platform usually includes the so-called management system of the systems to be set up, in addition to the interfaces used by administrators of these systems to install, configure and manage computer applications. The platform is therefore usually this layer in a computer infrastructure that is used to make applications available to users. In turn, the chosen platform is often determining for the applications that can be installed on the IT system, in which programming language these applications should be written, etc.
17. It is mainly the applications that are relevant to users, since they come into direct contact with these elements, work, create data, change them and make them available to others if necessary. In most cases, users only sporadically or only indirectly come into contact with the actual platform or infrastructure, since these last two layers have a critical but purely supportive function for the correct and permanent functioning of the applications.
18. The most important common feature of each of the above categories of information society services is that they are all based on the concept that IT infrastructures, platforms, applications, processes and data directly or indirectly related to them upon request can be made available to the user via secure or non-secured channels, such as the internet, or otherwise, remotely (ie without the service provider and the user having to be at the same physical location).
19. From the above categories, certain specific applications, functions and functionalities can also be supplied separately as a service, in some cases even independent of the way in which the infrastructure or platform is managed and used.
20. These components include: - "Storage as a Service" ("STaaS"), which uses decentralized and virtualized storage capacity for data made available to the user (s) by a third party / service provider the Internet or an assigned network connection, - "Security as a Service" ("SECaaS"), is a service in which the service provider of a security infrastructure, platform, or application integrates his or her technology into the IT infrastructure of a customer of the service, where the latter can benefit from more efficient, effective, robust and updated security of its IT systems, in which services are often authentication and user rights, antivirus applications, anti-malware / spam, detection of unauthorized access and / or use of the infrastructure, platforms, applications, processes, functionalities and / or data, and the follow-up and management of security-related events or events included; - "Data as a Service" ("DaaS"): a service in which data are made available, but in a manner that is independent of the interfaces used by the user when consulting this data. The service is that the service provider can deliver data in a user-specific format from a central location, which also improves the accuracy of the data: 21. Both traditional server-based services of the information society and cloud computing therefore mean that IT - infrastructures, platforms, applications, processes and / or data to which authorized users have access from another location are made available to the person where the user in question is present at the time he wishes to use it or access it wish to obtain.
22. Cloud computing therefore offers a number of important advantages over traditional, single-server internet applications: permanent access to applications, processes and data with different processing units; reduced risk of loss due to external circumstances; standardization of the configurations of the different systems; etc.
23. In the first place, the failure or non-availability of one server does not result in the data and processes being hosted on this server becoming unavailable: the other servers in the network take over these processes and offer copies of the consulted data. In the second place, this also benefits the safety and security of the data and processes.
24. The main benefit for the information society service provider offering cloud computing services is that they can make optimum use of the systems they make available. Since the provision of IT infrastructure, platforms, applications, processes and in certain cases also data is disconnected from the actual physical location and systems from which they are offered, the service provider can achieve significant economies of scale by making optimal use of the available hardware, software and network connections.
25. However, cloud computing has a number of important limitations: - One of the most important limitations is the interdependence between the different applications being offered. In the case of faulty or incomplete configurations, the possibility remains that the failure of a single machine will result in applications and / or data on this machine or made available mainly from this machine being made available to users.
- Also a provider of services based on cloud computing will try as much as possible not to deviate from a standard configuration of the systems, in order not to make the management of the server network endlessly complex. This automatically implies that buyers of services based on cloud computing can often only enjoy a limited range of applications and processes.
The offer from the different providers of cloud computing services usually consists of one or more packages of pre-defined and pre-configured platforms, applications, and processes that are offered as a "service". This is often inspired by the technical and practical difficulties that a personalized configuration entails, in particular when the arrangement and configuration of hardware and software is so specific and / or is only made available to a limited number of users.
A.3. DESCRIPTION OF THE INVENTION 26. The invention described herein relates to an IT system that provides for more efficient and personalized installation, configuration and management of the information society services described above, and in particular the hosting and provision of IT applications via a computer network. , processes and data.
27. This system consists of a set of interdependent and independent processes with the aim of: (i) eliminating certain disadvantages and difficulties of the technologies used and commercialized today, whereby users, based on their own level of knowledge , can make certain adjustments to the chosen IT infrastructure, platforms, applications, and processes in order to make optimal use of the services purchased; (ii) facilitate the initial and gradual configuration of IT infrastructures, platforms, applications, processes and data made available and stored in the context of information society services; (ui) make the management of these IT infrastructures, platforms, applications, processes and data more efficient for system administrators; [iv) facilitate the expansion of these IT infrastructures, platforms, applications, processes, limiting "down-time" and, in some cases, eliminating them altogether; (V) interdependence between the different IT platforms, - eliminate applications and processes that are managed and made available to users on a single IT infrastructure and give individual users or groups of users the opportunity to create individualized solutions and configurations of such platforms, applications, and - select and use processes independently of the underlying IT infrastructure (vi) improve the functionality of the various processes, applications and data made available (vii) the speed of processing the various processes, applications and data made available to increase.
28. The IT system is an integrated set of physical machines and hardware and software components that detect changes to the IT system and, based on the parameters specified by the system administrator, autonomously optimizes the IT system in terms of operation, maintenance, security and use .
These changes to the IT system can consist of the expansion or containment of the physical machines and components by the system administrator, as well as the provision by this manager of additional (new) versions of computer programs that are managed on the IT system and / or used.
29. In view of the technical possibilities and limitations that these changes imply, the system, if appropriate instructed by the manager, will detect these changes to the system (autonomously) and provide an optimal configuration of these based on these new elements.
This optimization may involve moving to new physical machines certain (frequently used) data or applications (such as websites) in order to relieve the existing physical machines from which these data and applications were made available. The IT system can also autonomously decide on new versions of management systems, computer programs that control hardware (so-called
"drivers"), databases, etc. that are made available through various management interfaces of the IT system, without the need for separate interventions on the individual machines that are part of the IT system. These interfaces can consist of a visual web application made available via the system, as well as more advanced interfaces that can be integrated by the user into his own management systems (so-called Application Programming Interfaces).
30. One of the most important components that form part of the invention therefore entails that existing and future users of one or more components relating to the hosting and provision of IT infrastructures, platforms, applications, processes and processes and data using a single (graphical) interface, or using an interface that can be integrated by the user into his own management systems.
With the help of this interface, an authorized user can first of all make his own choices about the IT infrastructure (s), platform (s), application (s), functionality (s) and / or process (s) that he wishes to use. It is thus possible for the user to make detailed choices himself about the necessary IT infrastructure, the platforms, applications, functionalities and processes to be used that are either offered as standard or can be adjusted by himself or third parties at the user's request. or parameterized.
31. This system allows both the system administrator and authorized users to add new products [latforms, applications, functionalities) or services to the extent that they are compatible with the system, which offers the possibility to the system administrator and authorized users. users to use the system in a flexible way.
32. In addition, based on parameters that can be set by the system administrator, the system will autonomously make suggestions and possibly even decide which IT infrastructure (s), platform (s), application (s), - functionality (s) and / or process (s) are either most suitable for the user. The system will take into account the specific profile of the user, his needs and knowledge, or autonomously add additional IT applications and / or functionalities to the configuration based on the parameters mentioned above.
These parameters include in particular the following: - the total volume of data traffic that is processed and managed by the system administrator infrastructures, platforms, applications, functionalities and data; - the total volume of data traffic reserved for the specific user; - the applications, functionalities and nature of the data processed and made available by the system administrator and selected by the user; - the applications, functionalities and data made available by the system administrator and used by the user from third parties that have been integrated by the user into their own environment.
Moreover, via an interface it can be determined when creating a new user for [one or more) specific applications) on which IT infrastructure, and / or platform this user and his application (s) can be served in the most optimal way , respectively managed and / or used, both in terms of functionality and visibility.
33. If one or more limits set by the system administrator for a particular user or category of users are exceeded, the system will also be able to autonomously decide on one or more of the IT infrastructure used by this user or users. and), platform (s), application (s), functionality (s), process (s) and / or transfer data to other physical machines.
This functionality has a number of advantages for both the user (s) and the system administrator, namely: the services provided by the user are not interrupted during the migration, - the system administrator will only have to make limited changes to the existing IT infrastructure, namely adding physical machines, since the entire level is taken over by the level of the control and management system, - the system administrator will not have to configure the added physical machines, nor provide the necessary software, since the control system is responsible for the actual installation, and parameterization of the newly added physical machine (s).
34. The advantages of this application are the following: (i) Firstly, the user and the applications activated or installed by him or her will be able to enjoy the latest new functionalities that the system administrator provides to all users at the same time. offered without having to perform individual installations or configurations per user; (ii) Secondly, this application offers the cloud computing environment administrator the ability and flexibility to add additional or different servers to the server network , or to replace certain servers without affecting the settings or configurations of the other servers.This application allows the server network administrator to manage his server network more optimally and efficiently.
(iii) Thirdly, this application allows the server network administrator to gradually move certain servers or the entire network to one or more other physical locations in the event of any hardware problems, without this having a negative impact on the server network. data, applications and processes made available by the network to its users.
35. This system also determines autonomously how incoming and outgoing data traffic should be managed, which data flows and instructions should be given priority, and which specific processes should be controlled. Such a system has several advantages.
36. In the first place, the system will autonomously control incoming data traffic (for the use or delivery of applications, processes or data) in such a way that the different servers within the network are burdened in an even way. to link priorities to certain data, processes and applications, the system therefore takes these preferences and qualifications into account, and will manage and control the various data, processes and applications on the basis of these parameters.
However, should it become apparent that a particular server would become overloaded - which could be the case, for example, in an unlawful attempt to gain access to the infrastructure or make it unavailable (a so-called "distributed déniai of service attack" or "DDoS") then the system will autonomously ensure that the data traffic is evenly distributed over a number of other points that provide access to the system, the applications, the processes and / or the data, or that it is isolated and directed to a server within the network specifically set up to prevent such unlawful attacks, and to centralize and answer (or not respond to) these requests.
In this way, the entire infrastructure is never overloaded, nor is it possible to make this infrastructure completely or partially unavailable in such a way that legitimate users are hindered by this attack.
37. Second, the system decides autonomously, on the basis of the nature of the incoming requests, to query certain specific systems managed and made available by the service provider and the systems, applications made available by them , processes and data to the applicant. Examples of such requests may have the following characteristics: electronic mail, search or inclusion of data in a database, requesting a web page, etc.
38. The application can also identify certain instructions given to the IT system and - in the event of an attempt to unlawfully break into the IT system, consult, delete or modify data - isolate this instruction autonomously and not execute it.
The advantage of this application is that the management of security applications is considerably more efficient, that security incidents are avoided, and that human intervention in the event of a security incident is limited.
39. Subsequently, this arrangement offers the possibility to bundle the range of IT infrastructures, platforms, applications, functionalities and / or processes. As a result, different service packages can be developed that are aligned with one or more specific target groups or users, and this on the basis of the specific needs, needs and requests of these target groups and / or users.
40. This arrangement also offers the possibility to third parties who do not have the necessary IT infrastructure, hardware and software to, in their own name and for their own account, general or specific IT infrastructures, platforms, applications, bundle functionalities and / or processes and offer them to customers.
41. The service packages put together by system operators or resellers in accordance with margins 40 and 41 may include one or more specific services of the information society, which in turn can also be individually configured and parameterised. These specific services may include the provision of storage space, one or more websites, databases, e-mail addresses and storage space for e-mails, caching, etc. The configurations and parameters that can be set by the customer may include data volume, storage capacity, as well as specific functionalities, software, and hardware.
权利要求:
Claims (16)
[1]
1. A system responsible for the configuration and management of: a. A group of computers, each containing at least one memory module, network interface, and one or more central processing units ("central processing units" or "CPUs"), and which all are capable of receiving and answering data processing commands b) a network that includes the connection between the above computers (collectively referred to as "environment"), whereby this system autonomously makes decisions about the way in which data flows are received, passed on and answered, as well as the initiation and answering of orders to receive, send, process and store data, and the renewal or modification thereof, as well as the execution of these orders and the storage of data;
[2]
2. The system mentioned in Claim 1, which offers the possibility to support various IT infrastructures, platforms, applications, processes and protocols;
[3]
3. The system mentioned in Claim 1, which offers the possibility of configuring, adapting and making available to users various IT infrastructures, platforms, applications, processes and protocols;
[4]
4. The system mentioned in Claim 1, which offers the possibility for the administrators of the environment mentioned in Claim 1 to adjust, increase or increase the number of computers, processing units, storage media, memory modules, etc. that are part of the environment reduce without adversely affecting the environment as a whole or the individual components in particular, and without further human intervention being required in the configuration of the environment;
[5]
5. The system mentioned in Claim 1, which offers the possibility for the administrators of the environment mentioned in Claim 1 to change or expand the network, without further human intervention being required in the configuration of the environment ;
[6]
6. The system mentioned in Claim 1, which offers the possibility for the administrators and users of the environment to add, change or modify applications offered through the environment to the environment without further human intervention is necessary for the configuration of the environment;
[7]
7. The system stated in Claim 1, which autonomously determines the infrastructure (s), platform (s), applications and processes used in such a way based on the parameters specified by the administrator and the users of the environment to set up and configure the environment to be set up and used in the most efficient way possible, which efficiency is expressed in reduced energy consumption, faster response times of the various elements that are part of the environment, limitation of the capacity of the storage media and network , etc.
[8]
8. The system mentioned in Claim 1, whereby the users are given the option of using the interaction applications made available by the system either directly or indirectly - through an integrated application in the user's management systems - such a system to parameterize, adjust, and / or allow applications or not.
[9]
9. An application, integrated or not integrated into the environment described in Claim 1, that allows the user to extend the network security applications of the environment made available by the information society service provider to the user's IT environment, including the ability to make adjustments to the settings of these applications;
[10]
10. An application, integrated or not integrated into the environment described in Claim 1, that allows the user to use the caching applications used by the information society service provider in his or her own environment (being the temporary storage and quickly making available certain data that is repeatedly and frequently requested in the short term) to be extended to the user's IT environment, including the possibility to make adjustments to the settings of these applications;
[11]
11. An application that offers the possibility of making the environment described in Claim 1, whether or not extended with the applications described in Claim 7 and / or 8, available to other information society service providers, whereby they have the option of autonomously to compile service packages, including one or more elements included in the environment and applications described in Claims 1, 7 and 8, and to configure and offer these environments.
[12]
12. An application that makes it possible for information society service providers who configure, manage and offer autonomous environments within the framework of an environment managed by another service provider as described in Claim 1, offering the possibility of making such an offer in their own name and for own account of the former service providers, and / or whereby any reference to the name of the actual manager / service provider can be removed from the technical and operational specifications and arrangement of the environments offered.
[13]
13. An IT application that makes it possible to configure services packages based on the system stated in Claim 1, including the IT infrastructures, platforms, applications, processes and protocols made available through this system, and adjust;
[14]
14. The IT application mentioned in Claim 12, on the basis of which the composite service packages as well as the underlying IT infrastructures, platforms, applications, processes and protocols can be managed;
[15]
15. The IT application stated in Claims 12 and 13 that collectively or individually manages IT applications, processes and protocols based on the settings made by the administrator and / or user;
[16]
16. The IT application stated in Claim 12 that manages IT applications, processes and protocols based on availability and load of the configured IT applications, processes and protocols, the IT application being autonomous, but taking into account the settings stated in Claim 14, controls such processes in the most efficient manner;
类似技术:
公开号 | 公开日 | 专利标题
US10666670B2|2020-05-26|Managing security breaches in a networked computing environment
RU2751576C2|2021-07-15|Container-controlling and dispatching system
US10225164B2|2019-03-05|System and method for providing a cloud computing environment
US20110126168A1|2011-05-26|Cloud plarform for managing software as a service | resources
US8315999B2|2012-11-20|Policy-based file management for a storage delivery network
US9998470B1|2018-06-12|Enhanced data leakage detection in cloud services
US10135876B2|2018-11-20|Security compliance framework usage
CN108351922A|2018-07-31|To shielded file application rights management policy
AU2020201461A1|2020-03-19|A System and Method for Implementing a Private Computer Network
BE1020919A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A INFORMATION SYSTEM FOR INFORMATION SOCIETY SERVICES.
BE1020922A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A SHARED HOSTING SYSTEM.
Pramod et al.2013|Limitations and challenges in cloud-based applications development
BE1020921A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DATABASES.
BE1020923A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF DNS DATA AND DOMAIN NAMES.
BE1020920A4|2014-09-02|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF ELECTRONIC MAIL.
US9612927B1|2017-04-04|Managing server processes with proxy files
Dhaya et al.2021|Dynamic secure and automated infrastructure for private cloud data center
Manikandasaran et al.2018|Secure architecture for virtual machine to container migration in cloud computing
Singh2016|Analysis of cloud infrastructure with reference to data transfer and data security
Latekar et al.2020|Resolving Multi Tenancy Issues Using Cloud Automation
WO2021030219A1|2021-02-18|System and method for tag based resource limits or quotas in a cloud infrastructure environment
WO2022031694A1|2022-02-10|Scalable security for saas data lakes
KR20210099174A|2021-08-11|System, method and computer-readable storage medium for customizable event-triggered computation at edge locations
WO2021030220A1|2021-02-18|System and method for compartment quotas in a cloud infrastructure environment
Morrison et al.2016|A Data Location Control Model for Cloud Service Deployments
同族专利:
公开号 | 公开日
BE1020919B1|2019-09-16|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

法律状态:
优先权:
申请号 | 申请日 | 专利标题
BE201300313|2013-05-08|
BE20130313A|BE1020919B1|2013-05-08|2013-05-08|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A INFORMATION SYSTEM FOR SERVICES OF THE INFORMATION SOCIETY.|BE20130313A| BE1020919B1|2013-05-08|2013-05-08|APPLICATION FOR THE EFFICIENT CONFIGURATION AND MANAGEMENT OF A INFORMATION SYSTEM FOR SERVICES OF THE INFORMATION SOCIETY.|
[返回顶部]