会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • RESPONDING TO A POSSIBLE PRIVACY LEAK
    • 回应可能的隐私漏洞
    • US20140245452A1
    • 2014-08-28
    • US13777090
    • 2013-02-26
    • GENERAL INSTRUMENT CORPORATION
    • Joshua B. HurwitzDouglas A. KuhlmanLoren J. Rittle
    • H04L29/06
    • H04L63/04
    • When a user is about to perform a “communicative act” (e.g., to send an e-mail or to post to a social-networking site), the proposed communicative act is reviewed to see if it may lead to a privacy leak. If, upon review, it is determined that performing the proposed communicative act could lead to a privacy leak, then an appropriate response is taken, such as preventing the proposed act from being performed or suggesting a modification to the proposed act that would lessen the likelihood of a privacy leak. A privacy server creates a privacy profile for a user based on information about the user's personae and how those personae are used. Using that profile, the privacy server can judge whether a proposed communicative act would support an unwanted inference.
    • 当用户即将执行“交际行为”(例如,发送电子邮件或发布到社交网站)时,将审查所提出的交际行为,以查看是否可能导致隐私泄露。 如果经审查,确定执行拟议的交际行为可能导致隐私泄露,则采取适当的回应,例如防止提出的行为被执行或暗示修改拟议的行为,以减少可能性 的隐私泄露。 隐私服务器基于用户的个人信息和如何使用这些人物来创建用户的隐私简档。 使用该配置文件,隐私服务器可以判断所提出的交际行为是否将支持不需要的推论。
    • 3. 发明申请
    • Identifying and Preventing Leaks of Sensitive Information
    • 识别和预防敏感信息的泄漏
    • US20140230066A1
    • 2014-08-14
    • US13762942
    • 2013-02-08
    • GENERAL INSTRUMENT CORPORATION
    • Joshua B. HurwitzZhi FuDouglas A. Kuhlman
    • G06F21/60
    • G06F21/6263G06F21/556G06F2221/2117H04L63/0245H04L63/102
    • Determining sensitive information and preventing the unauthorized or unintended dissemination of such information are disclosed. Terms are determined from documents associated with users in a network. Distributions among users and relative frequencies with which the terms are used are determined. Link strengths between users are calculated. Based on the distribution of the terms, the relative frequencies of use among the user profiles and link strengths between users conducting information transactions that include the terms, a sensitivity level for each term can be determined. To determine whether a particular information transaction with particular terms may be conducted between two users in the network, a combination of link strength between the users and sensitivity level of the terms with respect to the users or users' profiles are considered. If the information transaction includes terms that are unknown to one of the users, then a warning or alarm can be raised.
    • 披露敏感信息的确定和防止未经授权或意外传播此类信息。 术语由与网络中的用户相关联的文档确定。 确定用户之间的分布和使用这些术语的相对频率。 计算用户之间的链接强度。 根据术语的分配,可以确定用户简档之间的相对使用频率和进行包括术语的信息交易的用户之间的链接强度,每个术语的灵敏度级别。 为了确定是否可以在网络中的两个用户之间进行具体特定术语的特定信息交易,考虑用户之间的链路强度和相对于用户或用户简档的术语的灵敏度级别的组合。 如果信息交易包含一个用户未知的条款,则可以提出警告或警报。
    • 4. 发明申请
    • HIGH AVAILABILITY EVENT LOG COLLECTION IN A NETWORKED SYSTEM
    • 网络系统中的高可用性事件日志收集
    • US20140101110A1
    • 2014-04-10
    • US13646798
    • 2012-10-08
    • GENERAL INSTRUMENT CORPORATION
    • Loren J. RittleDouglas A. KuhlmanGregory L. Singer
    • G06F17/30
    • H04L69/40G06F17/30165
    • A method includes storing data received at a first server to a first file and storing data received at a second server to a second file, where the data in the two files are substantially similar. The two files are distinct, independent files. The first server provides a copy of the first file to the second server to store. The first server then stores additional data to the first file, while the second server maintains the copy of the first file unchanged. The second server may also provide a copy of the second file to the first server to store and continues to store additional data to the second file, while maintaining the copy of the second file on the first server unchanged. Event reports may then be generated using the various files, which provide high availability due to the above method and corresponding system arrangement.
    • 一种方法包括将在第一服务器处接收到的数据存储到第一文件并将在第二服务器处接收的数据存储到第二文件,其中两个文件中的数据基本相似。 这两个文件是独立的独立文件。 第一个服务器将第一个文件的副本提供给第二个服务器进行存储。 然后,第一个服务器将附加数据存储到第一个文件,而第二个服务器维护第一个文件的副本不变。 第二服务器还可以向第一服务器提供第二文件的副本以存储并继续将附加数据存储到第二文件,同时保持第一服务器上的第二文件的副本不变。 然后可以使用由于上述方法和相应的系统布置而提供高可用性的各种文件来生成事件报告。