会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Employing user-context in connection with backup or restore of data
    • 使用与备份或还原数据相关的用户上下文
    • US08583603B2
    • 2013-11-12
    • US12417079
    • 2009-04-02
    • Lara M. SosnoskyLili ChengJohn D. MehrGeorge MoromisatoElissa E. Murphy
    • Lara M. SosnoskyLili ChengJohn D. MehrGeorge MoromisatoElissa E. Murphy
    • G06F17/30
    • G06F17/30073G06F11/1448G06F11/1458G06F11/1464G06F11/1469G06F17/30309
    • The claimed subject matter relates to architectures for facilitating network-accessible or local backup or restore features in a manner that leverages event-oriented contextual information associated with one or more users of the data to be backed up or restored. In particular, a first restore-based architecture can interface with an associated second backup-based architecture that hosts or maintains a backup data store in order to retrieve a version of the data file that is desired by a user. Additionally, the first architecture can obtain a log of contextual event descriptions that can be aggregated by the second architecture or obtained independently from, e.g. a social networking service or a calendar application associated with the user. Thus, in addition to displaying time and date information associated with the desired version, the first architecture can provide the user with a social context of event from the social services feeds to aid the user in distinguishing between multiple versions of the data file.
    • 所要求保护的主题涉及以利用与数据的一个或多个用户相关联的事件导向的上下文信息来备份或恢复的方式促进网络可访问或本地备份或恢复特征的架构。 特别地,第一基于恢复的架构可以与托管或维护备份数据存储的关联的基于第二备份的体系结构相接口,以便检索用户期望的数据文件的版本。 另外,第一架构可以获得可由第二架构聚合或可以独立于或不同地获得的上下文事件描述的对数。 社交网络服务或与用户相关联的日历应用程序。 因此,除了显示与期望版本相关联的时间和日期信息之外,第一架构可以向用户提供来自社交服务馈送的事件的社会上下文以帮助用户区分数据文件的多个版本。
    • 4. 发明授权
    • Spam filtering with probabilistic secure hashes
    • 垃圾邮件过滤与概率安全散列
    • US07660865B2
    • 2010-02-09
    • US10917077
    • 2004-08-12
    • Geoffrey J. HultenJoshua T. GoodmanRobert L. RounthwaiteManav MishraElissa E. MurphyJohn D. Mehr
    • Geoffrey J. HultenJoshua T. GoodmanRobert L. RounthwaiteManav MishraElissa E. MurphyJohn D. Mehr
    • G06F15/16H04L29/06
    • H04L51/12H04L63/0227H04L63/123
    • Disclosed are signature-based systems and methods that facilitate spam detection and prevention at least in part by calculating hash values for an incoming message and then determining a probability that the hash values indicate spam. In particular, the signatures generated for each incoming message can be compared to a database of both spam and good signatures. A count of the number of matches can be divided by a denominator value. The denominator value can be an overall volume of messages sent to the system per signature for example. The denominator value can be discounted to account for different treatments and timing of incoming messages. Furthermore, secure hashes can be generated by combining portions of multiple hashing components. A secure hash can be made from a combination of multiple hashing components or multiple combinations thereof. The signature based system can also be integrated with machine learning systems to optimize spam prevention.
    • 公开了基于签名的系统和方法,其至少部分地通过计算输入消息的散列值,然后确定散列值指示垃圾邮件的概率来促进垃圾邮件检测和预防。 特别地,为每个传入消息生成的签名可以与垃圾邮件和良好签名的数据库进行比较。 匹配次数的计数可以除以分母值。 分母值可以是例如每个签名发送到系统的消息的总体积。 分母值可以折扣,以解决传入消息的不同处理和时间。 此外,可以通过组合多个散列分量的部分来生成安全散列。 可以从多个散列组件或其多个组合的组合形成安全散列。 基于签名的系统也可以与机器学习系统集成,以优化垃圾邮件防范。
    • 5. 发明授权
    • Bare metal machine recovery from the cloud
    • 裸机从云端恢复
    • US08261126B2
    • 2012-09-04
    • US12417776
    • 2009-04-03
    • Lara M. SosnoskyElissa E. Murphy
    • Lara M. SosnoskyElissa E. Murphy
    • G06F11/00
    • H04L67/10H04L67/104
    • Provided herein are systems and methodologies for bare metal machine restoration of a client computing environment over a network-based backup system. System recovery can be performed by performing a network boot from a predetermined server or set of servers on the Internet and/or an associated local network, followed by retrieving information relating to an operating system and/or environment of a system being recovered, such as incremental or full operating system images. Upon retrieval of information, the information can be used to conduct a full restore of the operating environment of the computing device. Additionally, a user can restore personal or other system data following rebuilding of the system operating environment. A cloud-based structure is provided herein as well as a hybrid peer-to-peer/cloud-based structure, wherein information used in a restore can be obtained from a global network location (e.g., cloud server(s)) and/or from one or more local peers.
    • 本文提供了通过基于网络的备份系统对客户端计算环境进行裸机恢复的系统和方法。 可以通过从因特网上的预定服务器或服务器集合和/或相关联的本地网络执行网络引导来执行系统恢复,随后检索与正被恢复的系统的操作系统和/或环境相关的信息,诸如 增量或全部操作系统映像。 在检索到信息时,可以使用该信息来完全恢复计算设备的操作环境。 此外,用户可以在重建系统操作环境之后恢复个人或其他系统数据。 本文提供了基于云的结构以及混合的对等/基于云的结构,其中在恢复中使用的信息可以从全局网络位置(例如,云服务器)和/或 来自一个或多个本地同行。
    • 6. 发明申请
    • BARE METAL MACHINE RECOVERY FROM THE CLOUD
    • 从云中恢复的金属机器
    • US20100257346A1
    • 2010-10-07
    • US12417776
    • 2009-04-03
    • Lara M. SosnoskyElissa E. Murphy
    • Lara M. SosnoskyElissa E. Murphy
    • G06F15/177
    • H04L67/10H04L67/104
    • Provided herein are systems and methodologies for bare metal machine restoration of a client computing environment over a network-based backup system. System recovery can be performed by performing a network boot from a predetermined server or set of servers on the Internet and/or an associated local network, followed by retrieving information relating to an operating system and/or environment of a system being recovered, such as incremental or full operating system images. Upon retrieval of information, the information can be used to conduct a full restore of the operating environment of the computing device. Additionally, a user can restore personal or other system data following rebuilding of the system operating environment. A cloud-based structure is provided herein as well as a hybrid peer-to-peer/cloud-based structure, wherein information used in a restore can be obtained from a global network location (e.g., cloud server(s)) and/or from one or more local peers.
    • 本文提供了通过基于网络的备份系统对客户端计算环境进行裸机恢复的系统和方法。 可以通过从因特网上的预定服务器或服务器集合和/或相关联的本地网络执行网络引导来执行系统恢复,随后检索与正被恢复的系统的操作系统和/或环境相关的信息,诸如 增量或全部操作系统映像。 在检索到信息时,可以使用该信息来完全恢复计算设备的操作环境。 此外,用户可以在重建系统操作环境之后恢复个人或其他系统数据。 本文提供了基于云的结构以及混合的对等/基于云的结构,其中在恢复中使用的信息可以从全局网络位置(例如,云服务器)和/或 来自一个或多个本地同行。
    • 9. 发明授权
    • Incremental anti-spam lookup and update service
    • 增量的反垃圾邮件查询和更新服务
    • US07664819B2
    • 2010-02-16
    • US10879626
    • 2004-06-29
    • Elissa E. MurphyJoshua T GoodmanDerek M HazeurRobert L RounthwaiteGeoffrey J Hulten
    • Elissa E. MurphyJoshua T GoodmanDerek M HazeurRobert L RounthwaiteGeoffrey J Hulten
    • G06F12/16G06F15/16
    • G06Q10/107H04L51/12
    • The present invention provides a unique system and method that facilitates incrementally updating spam filters in near real time or real time. Incremental updates can be generated in part by difference learning. Difference learning involves training a new spam filter based on new data and then looking for the differences between the new spam filter and the existing spam filter. Differences can be determined at least in part by comparing the absolute values of parameter changes (weight changes of a feature between the two filters). Other factors such as frequency of parameters can be employed as well. In addition, available updates with respect to particular features or messages can be looked up using one or more lookup tables or databases. When incremental and/or feature-specific updates are available, they can be downloaded such as by a client for example. Incremental updates can be automatically provided or can be provided by request according to client or server preferences.
    • 本发明提供了一种独特的系统和方法,其便于实时或实时地逐渐更新垃圾邮件过滤器。 增量更新可以通过差异学习部分产生。 差异学习涉及到根据新数据来培训新的垃圾邮件过滤器,然后寻找新的垃圾邮件过滤器和现有的垃圾邮件过滤器之间的差异。 差异可以至少部分地通过比较参数变化的绝对值(两个滤波器之间的特征的权重变化)来确定。 也可以使用诸如参数频率的其他因素。 此外,可以使用一个或多个查找表或数据库查找关于特定特征或消息的可用更新。 当增量和/或功能特定的更新可用时,可以例如通过客户端下载它们。 增量更新可以自动提供,也可以根据客户端或服务器的偏好请求提供。