会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Searching for information utilizing a probabilistic detector
    • 使用概率检测器搜索信息
    • US07730058B2
    • 2010-06-01
    • US11243924
    • 2005-10-05
    • Gaurav SareenMark Steven ManasseMartin AbadiMichael A. Isard
    • Gaurav SareenMark Steven ManasseMartin AbadiMichael A. Isard
    • G06F7/00G06F17/30
    • G06F17/30687
    • A probabilistic detector is utilized to query a database. Utilization of a probabilistic detector provides assurance with 100 per cent probability that a search expression in the query is not in the database index. The probabilistic detector is implemented in the form of a Bloom filter. The probabilistic detector is created by hashing expressions in the database index and mapping the resulting hash values into the probabilistic detector. Upon receiving a query, expressions of the query are hashed. The probabilistic detector is queried using these hash values. If the results of querying the probabilistic detector indicate that searched for information may be in the database, the database is not queried. If the results of querying the probabilistic detector indicate that the information may be in the database, the database is queried for the information using the original query. This technique is advantageous in mitigating detrimental effects of denial of service attacks.
    • 利用概率检测器查询数据库。 概率检测器的利用率提供了100%的可能性,即查询中的搜索表达式不在数据库索引中。 概率检测器以Bloom滤波器的形式实现。 概率检测器是通过在数据库索引中散列表达式并将生成的散列值映射到概率检测器中创建的。 在接收到查询后,查询的表达式将被哈希。 使用这些散列值查询概率检测器。 如果查询概率检测器的结果表明搜索到的信息可能在数据库中,则不会查询数据库。 如果查询概率检测器的结果表明信息可能在数据库中,则使用原始查询查询数据库中的信息。 这种技术有利于减轻拒绝服务攻击的有害影响。
    • 3. 发明授权
    • Scalable differential compression of network data
    • 可扩展差分压缩的网络数据
    • US07640354B2
    • 2009-12-29
    • US11565867
    • 2006-12-01
    • Nikolaj Skallerud BjornerMark Steven ManasseGuilherme Issao Camarinha Fujiwara
    • Nikolaj Skallerud BjornerMark Steven ManasseGuilherme Issao Camarinha Fujiwara
    • G06F15/16
    • H03M7/30H03M7/3088H04L67/28H04L67/288Y10S707/99937
    • The present invention extends to methods, systems, and computer program products for scalable differential compression for network data. Network data exchanged between Wide Area Network (“WAN”) acceleration devices is cached at physical recordable-type computer-readable media having (potentially significantly) larger storage capacities than available system memory. The cached network data is indexed through features taken from a subset of the cached data (e.g., per segment) to reduce overhead associated with searching for cached network data to use for subsequent compression. When a feature match is detected between received and cached network data, the cached network data can be loaded from the physical recordable-type computer-readable media into system memory to facilitate data compression between Wide Area Network (“WAN”) acceleration devices more efficiently.
    • 本发明扩展到用于网络数据的可伸缩差分压缩的方法,系统和计算机程序产品。 在广域网(“WAN”)加速设备之间交换的网络数据被缓存在具有比可用系统存储器更大的存储容量(可能显着地)的物理可记录型计算机可读介质上。 缓存的网络数据通过从缓存数据的子集(例如,每个段)获取的特征来索引,以减少与搜索用于后续压缩的缓存的网络数据相关联的开销。 当在接收和缓存的网络数据之间检测到特征匹配时,缓存的网络数据可以从物理可记录型计算机可读介质加载到系统存储器中,以便于更有效地在广域网(“WAN”)加速设备之间进行数据压缩 。
    • 5. 发明授权
    • System and method for monitoring web pages by comparing generated abstracts
    • 通过比较生成的摘要来监控网页的系统和方法
    • US06269362B1
    • 2001-07-31
    • US08994939
    • 1997-12-19
    • Andrei Zary BroderSteven Charles GlassmanMark Steven Manasse
    • Andrei Zary BroderSteven Charles GlassmanMark Steven Manasse
    • G06F1730
    • G06F17/30864Y10S707/99931Y10S707/99933Y10S707/99934
    • Provided is a computerized method for monitoring the content of documents. A set of documents is stored in memories of server computers. The server computers can be connected to each other by a network such as the Internet. Entries are generated in a search engine for each document of the set. The search engine is also connected to the Internet. The entries are in the form of a full word index of the set of documents. The search engine also maintains a first abstract for each document that is indexed. The abstract is highly dependent on the content of each document. For example, the abstract is in the form of a sketch or a feature vector. Periodically a query is submitted to the search engine. The query locates a result set of documents that satisfy the query. A second abstract is generated for each document member of the result set. The first and second abstracts are compared to identify documents that have changed between the time the set of documents were indexed and the time the result set is generated.
    • 提供了一种用于监视文档内容的计算机化方法。 一组文件存储在服务器计算机的存储器中。 服务器计算机可以通过诸如因特网的网络彼此连接。 条目是在搜索引擎中为集合中的每个文档生成的。 搜索引擎也连接到互联网。 这些条目是一组文档的完整词索引的形式。 搜索引擎还为每个被索引的文档维护一个第一个摘要。 摘要高度依赖于每个文档的内容。 例如,抽象是草图或特征向量的形式。 定期向搜索引擎提交查询。 查询查找满足查询的文档的结果集。 为结果集的每个文档成员生成第二个摘要。 将第一和第二摘要进行比较,以识别在文档集被索引的时间与生成结果集的时间之间发生变化的文档。
    • 10. 发明授权
    • Memory bound functions for spam deterrence and the like
    • 用于垃圾邮件威慑的内存绑定功能等
    • US07149801B2
    • 2006-12-12
    • US10290879
    • 2002-11-08
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • G06F15/173H04K1/00
    • H04L63/126H04L51/12
    • A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    • 如果用户投入很少或没有成本,资源可能会被滥用。 例如,电子邮件滥用是猖獗的,因为发送电子邮件对发件人的成本可以忽略不计。 通过以中等昂贵的计算的形式引入人造成本,可能不鼓励这种滥用。 因此,电子邮件的发件人可能需要在电子邮件被接受之前几秒计算才能付款。 不幸的是,由于计算机系统之间的差异很大,对于具有高端系统的恶意用户来说,这种方法可能无效,对于具有低端系统的合法用户或者两者都是非常缓慢的。 从这个观察开始,我们确定了最近的计算机系统以相同的速度评估的适度硬的记忆绑定功能,我们解释如何使用它们来防止滥用。