会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Reliable and accurate usage detection of a software application
    • 软件应用的可靠和准确的使用检测
    • US08713535B2
    • 2014-04-29
    • US12165603
    • 2008-06-30
    • Nipoon MalhotraRam ViswanathanVikram KakumaniMauktik H. GandhiSarath MadakasiraYiming LiKiran Sagi
    • Nipoon MalhotraRam ViswanathanVikram KakumaniMauktik H. GandhiSarath MadakasiraYiming LiKiran Sagi
    • G06F9/44
    • G06F15/173G06F11/30G06Q30/02
    • Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds.
    • 通过将应用程序的组件分类为使用清单并在客户端PC上实施使用检测后台服务来检测软件应用程序的使用,该客户端PC根据使用情况清单来监视组件。 应用程序组件根据用户交互模式以及组件与应用程序的主动使用的相关性进行分类。 后台服务跟踪与应用程序组件相关联的事件和活动,以生成包括应用程序独特启动频率和每个独特使用持续时间的使用指标。 用于后台服务的使用管理器可以独立地利用组件的使用度量,或者在应用以交互方式工作的情况下(诸如Web浏览器的插件)来组合多个组件的度量,以便计算应用使用 通过将度量与预定义的阈值进行比较。
    • 3. 发明申请
    • INDEXING AND QUERYING HASH SEQUENCE MATRICES
    • 索引和查询哈希序列矩阵
    • US20120117080A1
    • 2012-05-10
    • US12943780
    • 2010-11-10
    • Charles William LamannaMauktik H. GandhiJason Eric Brewer
    • Charles William LamannaMauktik H. GandhiJason Eric Brewer
    • G06F17/30
    • G06F17/30613
    • Embodiments are directed to indexing and querying a sequence of hash values in an indexing matrix. A computer system accesses a document to extract a portion of text from the document. The computer system applies a hashing algorithm to the extracted text. The hash values of the extracted text form a representative sequence of hash values. The computer system inserts each hash value of the sequence of hash values into an indexing matrix, which is configured to store multiple different hash value sequences. The computer system also queries the indexing matrix to determine how similar the plurality of hash value sequences are to the selected hash value sequence based on how many hash values of the selected hash value sequence overlap with the hash values of the plurality of stored hash value sequences.
    • 实施例涉及索引和查询索引矩阵中的哈希值序列。 计算机系统访问文档以从文档中提取文本的一部分。 计算机系统对提取的文本应用散列算法。 提取的文本的哈希值形成代表性的散列值序列。 计算机系统将哈希值序列的每个散列值插入到索引矩阵中,索引矩阵被配置为存储多个不同的散列值序列。 计算机系统还根据所选择的散列值序列的多少哈希值与多个存储的散列值序列的散列值重叠来查询索引矩阵以确定多个哈希值序列与所选哈希值序列的相似度 。
    • 4. 发明申请
    • DYNAMIC RULE REORDERING FOR MESSAGE CLASSIFICATION
    • 动态规则重新发送消息分类
    • US20120303624A1
    • 2012-11-29
    • US13115804
    • 2011-05-25
    • Mauktik H. GandhiShashank KavishwarCharles W. Lamanna
    • Mauktik H. GandhiShashank KavishwarCharles W. Lamanna
    • G06F17/30
    • G06F17/2785G06F17/30445H04L51/12H04L51/22
    • Embodiments are directed to generating a customized classification rule execution order and to identifying optimal ordering rules for previously processed data. In an embodiment, a computer system fingerprints a message received via a computer network. The fingerprinting identifies specific characteristics of the message. The computer system compares the message's fingerprint to various stored message fingerprints generated from previously received messages. The comparison determines that the fingerprint does not match the stored fingerprints. The computer system applies classification rules to the message according to a predetermined rule execution order to determine a classification for the message. The computer system then generates a customized classification rule execution order to order those classification rules that optimally identified the message's class at the top of the customized classification rule execution order.
    • 实施例涉及生成定制的分类规则执行顺序并且识别先前处理的数据的最优排序规则。 在一个实施例中,计算机系统指纹通过计算机网络接收的消息。 指纹识别消息的特定特征。 计算机系统将消息的指纹与从先前接收到的消息生成的各种存储的消息指纹进行比较。 比较确定指纹与存储的指纹不匹配。 计算机系统根据预定的规则执行顺序对消息应用分类规则,以确定消息的分类。 然后,计算机系统生成定制的分类规则执行顺序,以便在定制的分类规则执行顺序的顶部订购最佳地识别消息的类的分类规则。
    • 7. 发明授权
    • Indexing and querying hash sequence matrices
    • 索引和查询哈希序列矩阵
    • US09129007B2
    • 2015-09-08
    • US12943780
    • 2010-11-10
    • Charles William LamannaMauktik H. GandhiJason Eric Brewer
    • Charles William LamannaMauktik H. GandhiJason Eric Brewer
    • G06F17/30
    • G06F17/30613
    • Embodiments are directed to indexing and querying a sequence of hash values in an indexing matrix. A computer system accesses a document to extract a portion of text from the document. The computer system applies a hashing algorithm to the extracted text. The hash values of the extracted text form a representative sequence of hash values. The computer system inserts each hash value of the sequence of hash values into an indexing matrix, which is configured to store multiple different hash value sequences. The computer system also queries the indexing matrix to determine how similar the plurality of hash value sequences are to the selected hash value sequence based on how many hash values of the selected hash value sequence overlap with the hash values of the plurality of stored hash value sequences.
    • 实施例涉及索引和查询索引矩阵中的哈希值序列。 计算机系统访问文档以从文档中提取文本的一部分。 计算机系统对提取的文本应用散列算法。 提取的文本的哈希值形成代表性的散列值序列。 计算机系统将哈希值序列的每个散列值插入索引矩阵,索引矩阵被配置为存储多个不同的散列值序列。 计算机系统还根据所选择的散列值序列的多少哈希值与多个存储的散列值序列的散列值重叠来查询索引矩阵以确定多个哈希值序列与所选哈希值序列的相似度 。
    • 9. 发明授权
    • Dynamic rule reordering for message classification
    • 动态规则重新排序消息分类
    • US09116879B2
    • 2015-08-25
    • US13115804
    • 2011-05-25
    • Mauktik H. GandhiShashank KavishwarCharles W. Lamanna
    • Mauktik H. GandhiShashank KavishwarCharles W. Lamanna
    • G06F17/30G06F17/27H04L12/58
    • G06F17/2785G06F17/30445H04L51/12H04L51/22
    • Embodiments are directed to generating a customized classification rule execution order and to identifying optimal ordering rules for previously processed data. In an embodiment, a computer system fingerprints a message received via a computer network. The fingerprinting identifies specific characteristics of the message. The computer system compares the message's fingerprint to various stored message fingerprints generated from previously received messages. The comparison determines that the fingerprint does not match the stored fingerprints. The computer system applies classification rules to the message according to a predetermined rule execution order to determine a classification for the message. The computer system then generates a customized classification rule execution order to order those classification rules that optimally identified the message's class at the top of the customized classification rule execution order.
    • 实施例涉及生成定制的分类规则执行顺序并且识别先前处理的数据的最优排序规则。 在一个实施例中,计算机系统指纹通过计算机网络接收的消息。 指纹识别消息的特定特征。 计算机系统将消息的指纹与从先前接收到的消息生成的各种存储的消息指纹进行比较。 比较确定指纹与存储的指纹不匹配。 计算机系统根据预定的规则执行顺序对消息应用分类规则,以确定消息的分类。 然后,计算机系统生成定制的分类规则执行顺序,以便在定制的分类规则执行顺序的顶部订购最佳地识别消息的类的分类规则。
    • 10. 发明申请
    • CONDITIONAL EXECUTION OF REGULAR EXPRESSIONS
    • 常规表达的条件执行
    • US20120110003A1
    • 2012-05-03
    • US12938895
    • 2010-11-03
    • Jason E. BrewerCharles W. LamannaMauktik H. Gandhi
    • Jason E. BrewerCharles W. LamannaMauktik H. Gandhi
    • G06F17/30
    • G06F16/90344
    • Embodiments directed to conditionally executing regular expressions and to simplifying regular expressions by canonicalizing regular expression terms. In an embodiment, a computer system accesses identified regular expression key terms that are to appear in a selected portion of text. The regular expression key terms are identified from terms in a selected regular expression. The computer system determines whether the identified regular expression key terms appear in the selected portion of text. The computer system also, upon determining that none of the identified regular expression key terms appears in the selected portion of text, prevents execution of the regular expression. Upon determining that at least one of the identified regular expression key terms appears in the selected portion of text, the computer system executes the regular expression.
    • 实现有条件地执行正则表达式和通过规范正则表达式术语来简化正则表达式。 在一个实施例中,计算机系统访问将出现在文本的所选部分中的识别的正则表达关键词。 正则表达式关键词是根据所选正则表达式中的项来确定的。 计算机系统确定所识别的正则表达式关键词是否出现在文本的所选部分中。 计算机系统在确定所标识的正则表达式关键词中没有一个出现在文本的所选部分中时,也可防止正则表达式的执行。 在确定所识别的正则表达式关键词中的至少一个出现在文本的所选部分中时,计算机系统执行正则表达式。