会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Profiling application usage from application streaming
    • 从应用程序流分析应用程序的使用情况
    • US08977764B1
    • 2015-03-10
    • US12039515
    • 2008-02-28
    • Zulfikar RamzanSourabh SatishBrian Hernacki
    • Zulfikar RamzanSourabh SatishBrian Hernacki
    • G06F15/16
    • G06F11/3466G06F9/44521G06F11/3409G06F2201/865
    • Application usage is profiled based on application streaming. Code pages of multiple applications are streamed from a server to multiple client computers (endpoints) for execution. The streaming of the code pages is monitored, and usage data is collected such as which pages are streamed to which endpoints, under what circumstances and when. By referencing the streamed code pages and the underlying source code, the code pages are mapped (at least approximately) to corresponding application features. The collected usage data usage and the relevant mapping are analyzed, to create application usage profile data for streamed applications. The application usage profile data can include such information as how often, when, where and by whom application components are being executed, as well as which components cause errors, are most popular, confuse users, etc.
    • 应用程序使用情况基于应用程序流式进行分析。 多个应用程序的代码页从服务器流式传输到多个客户端计算机(端点)以供执行。 监视代码页的流式传输,并收集使用数据,例如哪些页面被流式传输到哪个端点,在什么情况下和什么时候。 通过引用流传输的代码页和底层的源代码,代码页被映射(至少近似)到相应的应用程序特征。 分析收集的使用数据用法和相关映射,以创建流应用程序的应用程序使用情况数据。 应用程序使用情况数据可以包括诸如应用组件的执行频率,何时何地以及由哪个应用组件执行的信息以及哪些组件导致错误,最受欢迎的,混淆用户等的信息。
    • 6. 发明授权
    • Prioritizing tasks from virtual machines
    • 从虚拟机优先处理任务
    • US08424007B1
    • 2013-04-16
    • US12242685
    • 2008-09-30
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • G06F9/46
    • G06F9/4881G06F9/485G06F2209/503
    • A computer-implemented method for prioritizing virtual machine tasks may include receiving a request to perform a first task from a virtual machine. The request may include information relevant to determining a priority of the task. The method may include determining the priority of the task based on the information. The method may further include scheduling the first task based on the priority of the task. The method may include selecting the first task for execution based on the scheduling. The method may include notifying the virtual machine that the first task has been selected for execution. Various related methods, computer-readable media, and systems are also disclosed.
    • 用于对虚拟机任务进行优先级的计算机实现的方法可以包括从虚拟机接收执行第一任务的请求。 该请求可以包括与确定任务的优先级有关的信息。 该方法可以包括基于该信息确定任务的优先级。 该方法还可以包括基于任务的优先级调度第一任务。 该方法可以包括基于调度来选择用于执行的第一任务。 该方法可以包括通知虚拟机第一任务已经被选择用于执行。 还公开了各种相关方法,计算机可读介质和系统。
    • 8. 发明授权
    • Method and apparatus to determine device mobility history
    • 确定设备移动性历史的方法和设备
    • US08255517B1
    • 2012-08-28
    • US11477503
    • 2006-06-29
    • Brian HernackiSourabh Satish
    • Brian HernackiSourabh Satish
    • G06F15/173
    • H04W12/12H04W12/08H04W74/00H04W76/00H04W76/18
    • A method, system and computer-readable medium for securing access between a mobile computing device and a network computer is described. The method comprises upon a connection by the mobile computing device to a network or a device, recording the connection in a history database and processing the history database to assign a risk level to the mobile computing device. The system comprises the mobile computing device comprising a connection history collection agent for collecting information about a computing environment and the host computer comprising wireless environment data derived from the collected information where the host computer uses the wireless environment data to grant or deny a connection to the mobile computing device.
    • 描述了用于保护移动计算设备和网络计算机之间的接入的方法,系统和计算机可读介质。 该方法包括通过移动计算设备连接到网络或设备,在历史数据库中记录连接并处理历史数据库以向移动计算设备分配风险级别。 该系统包括移动计算设备,该移动计算设备包括用于收集关于计算环境的信息的连接历史收集代理,并且主计算机包括从收集的信息导出的无线环境数据,其中主计算机使用无线环境数据来准许或拒绝与 移动计算设备。
    • 9. 发明授权
    • Endpoint management using trust rating data
    • 端点管理使用信任评级数据
    • US08239915B1
    • 2012-08-07
    • US11427938
    • 2006-06-30
    • Sourabh SatishBrian Hernacki
    • Sourabh SatishBrian Hernacki
    • H04L29/06
    • H04L63/20G06F21/00G06F21/604
    • Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired.
    • 公开了实现动态端点管理的技术。 根据一个实施例,每当端点首次加入受管网络或重新加入该网络时,本地安全模块将应用列表(例如全部或增量)提交给安全服务器。 服务器验证列表,并发送这些应用程序的规则集(例如,允许/阻止规则和/或必需的应用程序安全设置)。 如果服务器没有给定应用程序的信息,它可以进一步订阅来自内容提供商或服务的内容。 当服务器查询未知应用程序时,服务器向服务提供商发送查询以获得该未知应用程序的信任等级。 然后可以使用信任评级来为未知应用程序生成规则集。 如果需要,功能可以从服务器转移到客户端,反之亦然。