会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Identifying purpose-based origin-destination using call detailed records
    • 使用呼叫详细记录识别基于目的的起始目的地
    • US09042908B2
    • 2015-05-26
    • US13467035
    • 2012-05-08
    • Jing DaiMing LiPavankumar MuraliMilind R. NaphadeSambit Sahu
    • Jing DaiMing LiPavankumar MuraliMilind R. NaphadeSambit Sahu
    • H04W24/00G08G1/01H04M15/00
    • G08G1/012H04M15/58
    • Access is obtained to call data records (or other data) for a plurality of mobile telephony users. The call data records (or other data) include location-time sequences. For each of the mobile telephony users, corresponding ones of the location-time sequences are segmented into trips; a home-work-school classification model is used to determine a home location and a work-school location, based on the trips; and a trip purpose classification model is used to assign each of the trips a purpose label, based at least on comparing at least one of a start location and an end location for each one of the trips to at least one of the home location and the work-school location determined using the home-work-school classification model. The trips are aggregated into purpose based origin-destination categories based at least on the purpose labels, time ranges of the location-time sequences, and the start and end locations.
    • 获得访问以呼叫多个移动电话用户的数据记录(或其他数据)。 呼叫数据记录(或其他数据)包括位置时间序列。 对于每个移动电话用户,将相应的位置时间序列分段为行程; 家庭工作学校分类模型用于根据旅行情况确定住所和工作地点; 并且旅行目的分类模型用于将每个行程分配目的标签,至少基于将每个行程的起始位置和结束位置中的至少一个比较到本地位置和 使用家庭工作学校分类模型确定工作学校的位置。 至少基于目的标签,位置 - 时间序列的时间范围以及开始和结束位置,将旅行聚合到基于目的的起始 - 目的地类别。
    • 3. 发明授权
    • Method and apparatus for security-aware elasticity of application and services
    • 应用和服务的安全感知弹性的方法和装置
    • US08793766B2
    • 2014-07-29
    • US13419037
    • 2012-03-13
    • Ashish KunduAjay MohindraSambit Sahu
    • Ashish KunduAjay MohindraSambit Sahu
    • G06F21/00H04L29/06G06F9/50
    • G06F21/604G06F2209/5019
    • In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
    • 在用于扩展/降低应用程序的安全性(非功能))组件的方法中,确定(a)每个非安全(功能)组件具有的多个交互的安全组件的交互类型和每种类型的交互的数量, 要求。 根据(a)和对应用程序的传入请求的预期数量确定(b)与涉及非安全组件的安全组件的请求类型和与其相互作用,以及(c)与 涉及非安全组件的安全组件,用于针对涉及非安全组件的安全组件的每种请求类型。 为每个安全组件确定涉及非安全组件的每种类型的请求所需的容量以及涉及非安全组件的每种类型的交互所需的容量。 将安全组件的能力改变为新能力,其中新能力基于(a),(c)和确定的能力。
    • 6. 发明申请
    • METHOD AND APPARATUS FOR EFFICIENT AND ACCURATE ANALYTICS WITH CROSS-DOMAIN CORRELATION
    • 有效和准确的跨域关联分析的方法和装置
    • US20120215829A1
    • 2012-08-23
    • US13029699
    • 2011-02-17
    • Milind NaphadeSambit SahuJing Dai
    • Milind NaphadeSambit SahuJing Dai
    • G06F15/16
    • G06F15/18G06N99/005
    • A method of generating analytics to provide an analysis of data from distinct data domains includes collecting sensor data from at least two distinct data domains, deriving parameters from the collected data, wherein at least one of the parameters is a first domain parameter derived from one of the data domains and at least another one of the parameters is a second domain parameter derived from the other data domain, providing a data model that enables a user to specify at least one of the first parameters and at least one of the second domain parameters and generate at least one rule based on the selected parameters, and generating analytics that analyze the collected data against the rules to determinate whether the rules have been satisfied and provide results of the analysis to a user of the analytics.
    • 生成分析以提供来自不同数据域的数据分析的方法包括从至少两个不同的数据域收集传感器数据,从所收集的数据中导出参数,其中至少一个参数是从 所述数据域和所述参数中的至少另一个参数是从所述其他数据域导出的第二域参数,提供使得用户能够指定所述第一参数中的至少一个和所述第二域参数中的至少一个的数据模型, 基于所选择的参数生成至少一个规则,以及生成分析数据,根据规则分析所收集的数据,以确定规则是否已被满足,并向分析用户提供分析结果。
    • 9. 发明授权
    • Method and apparatus for failure resilient forwarding of data over a computer network
    • 通过计算机网络对数据进行故障恢复转发的方法和装置
    • US07969869B2
    • 2011-06-28
    • US12135764
    • 2008-06-09
    • Zhen LiuSambit SahuJeremy I. Silber
    • Zhen LiuSambit SahuJeremy I. Silber
    • H04L12/26
    • H04L41/0654H04L45/00H04L67/2842H04L67/2852H04L69/16H04L69/163H04L69/165H04L69/40
    • In one embodiment, a method and an apparatus for failure-resilient forwarding of data over a computer network include introducing a marker into the data stream, e.g., at the sending node, and allowing, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker.
    • 在一个实施例中,用于通过计算机网络进行数据故障恢复转发的方法和装置包括将标记引入到数据流中,例如在发送节点处,并且允许有效地转发节点和/或接收器 跟踪数据流接收。 标记用作数据传输过程的检查点,并在每个转发节点和接收器处被识别和索引。 每个接收器在将数据传送到应用程序之前保存标记,从而指定数据流中的所有先前数据被确认已被递送到应用的点。 因此,如果转发节点发生故障,则接收方可以通过指定备用转发节点从标记开始提供数据来从备用转发节点请求流数据。
    • 10. 发明授权
    • Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
    • 用于提高内容分发网络对分布式拒绝服务攻击的弹性的方法和装置
    • US07836295B2
    • 2010-11-16
    • US10207695
    • 2002-07-29
    • Suresh N. ChariPau-Chen ChengKang-Won LeeSambit SahuAnees A. Shaikh
    • Suresh N. ChariPau-Chen ChengKang-Won LeeSambit SahuAnees A. Shaikh
    • H04L12/66
    • H04L63/1408H04L63/1458H04L67/1002
    • Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n2)amount of traffic to victimize a CDN-hosted site when the site content is served from n CDN caches. Without these modifications, the attacker must generate only O(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN.
    • 提供了适用于内容分发网络(CDN)的几种威慑机制。 这些包括基于散列的请求路由方案和站点分配方案。 基于散列的请求路由方案提供了一种区分合法请求与假请求的方法。 使用这种机制,当从n个CDN缓存提供站点内容时,攻击者需要生成O(n2)个流量来伤害CDN托管站点。 没有这些修改,攻击者必须只生成O(n)流量才能关闭该站点。 站点分配方案可以在CDN托管的网站之间提供足够的隔离,以防止一个网站的攻击使其他站点不可用。 使用基于二进制代码的分配策略,可以保证对任何单个网站的成功攻击禁用其分配的服务器,也不会导致其他由CDN托管的网站。