会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • OBSERVABLE DATA COLLECTION AND ANALYSIS
    • 可视数据收集和分析
    • US20140335491A1
    • 2014-11-13
    • US14242360
    • 2014-04-01
    • George Mason Intellectual Properties, Inc.
    • Michael M. BEHRMANNShuangbao WANGHeidi J. GRAFF
    • G09B19/00
    • G09B19/00G06Q10/00G06Q50/20G09B7/077
    • An observable behavior data collection and analysis system including at least two database collection modules and an analysis module. The database collection module(s) include a parameter storage module, an observable behavior data prompt module, an observable behavior data collection module, a collection phase assignment module, and a server storage module. An instructor observes a subject performing a prompted task and enters the observed data into one of the database collection modules. The data is stored on a server. The analysis module, which includes a filter module and an output generation module, reads the data from the server and generates interactive graphs that may be used by the instructor to treat the subject.
    • 包括至少两个数据库收集模块和分析模块的可观察行为数据收集和分析系统。 数据库收集模块包括参数存储模块,可观察行为数据提示模块,可观察行为数据收集模块,收集阶段分配模块和服务器存储模块。 指导者观察执行提示任务的主体,并将观察到的数据输入到数据库收集模块之一。 数据存储在服务器上。 分析模块包括一个过滤器模块和一个输出生成模块,从服务器读取数据,并产生可由教师用来对待对象的交互式图形。
    • 3. 发明授权
    • Intrusion event correlation system
    • 入侵事件相关系统
    • US08719943B2
    • 2014-05-06
    • US13466706
    • 2012-05-08
    • Steven E NoelSushil JajodiaEric B Robertson
    • Steven E NoelSushil JajodiaEric B Robertson
    • H04L29/06
    • H04L41/12H04L63/1425
    • Disclosed is a system for correlating intrusion events using attack graph distances. The system includes an attack graph generator, an exploit distance calculator, an intrusion detector, an event report/exploit associator, an event graph creator, an event graph distance calculator, a correlation value calculator, and a coordinated attack analyzer. An attack graph is constructed for exploits and conditions in a network. The exploit distance calculator determines exploit distances for exploit pair(s). The intrusion detector generates event. Events are associated with exploits. Event graph distances are calculated. Correlation values are calculated for event pair(s) using event graph distances. The correlation values are analyzed using a correlation threshold to detect coordinated attacks.
    • 公开了一种使用攻击图距离来相关入侵事件的系统。 该系统包括攻击图生成器,利用距离计算器,入侵检测器,事件报告/利用关联器,事件图形创建器,事件图距离计算器,相关值计算器和协调攻击分析器。 为网络中的利用和条件构建攻击图。 利用距离计算器确定漏洞利用距离。 入侵检测器生成事件。 事件与漏洞相关联。 计算事件图距离。 使用事件图距离计算事件对的相关值。 使用相关阈值分析相关值以检测协调的攻击。
    • 5. 发明授权
    • mTOR pathway theranostic
    • mTOR通路
    • US08628931B2
    • 2014-01-14
    • US12083866
    • 2006-10-18
    • Lance A. LiottaEmanuel F. Petricoin, IIIVirginia Espina
    • Lance A. LiottaEmanuel F. Petricoin, IIIVirginia Espina
    • G01N33/53G01N33/50G01N33/52
    • G01N33/6842G01N2800/52
    • This invention relates, e.g., to a method for predicting a subject's response to a chemotherapeutic agent and/or the subject's prognosis, comprising measuring the phosphorylation state of at least one member of the mTOR pathway, and/or of at least one member of an interconnected polypeptide pathway (e.g. a member of the Akt pathway or a member of the IRS pathway), compared to a baseline value, in a cancer tissue or cancer cell sample from the subject, wherein an elevated level of the phosphorylation state compared to the baseline value indicates that the subject is a non-responder to the chemotherapeutic agent and/or has a poor prognosis. Also described is a method for treating a cancer in a subject in need thereof, wherein the subject exhibits an elevated level of the phosphorylation state, comprising administering one or more inhibitors of the mTOR and/or an interconnected pathway.
    • 本发明涉及例如用于预测受试者对化学治疗剂和/或受试者预后的反应的方法,包括测量mTOR途径的至少一个成员的磷酸化状态和/或至少一种成员 相互作用的多肽途径(例如Akt途径的成员或IRS途径的成员)与来自受试者的癌症组织或癌细胞样品中的基线值相比,其中与基线相比提高了磷酸化水平 值表明受试者是化疗药物的无反应者和/或预后不良。 还描述了在有需要的受试者中治疗癌症的方法,其中所述受试者表现出升高的磷酸化状态水平,包括施用一种或多种mTOR抑制剂和/或互连途径。
    • 6. 发明授权
    • Cognitive channel assignment in wireless networks
    • 无线网络中的认知信道分配
    • US08594028B2
    • 2013-11-26
    • US12475966
    • 2009-06-01
    • Brian L. Mark
    • Brian L. Mark
    • H04W4/00
    • H04L5/0073H04W16/14H04W24/00H04W52/143H04W52/146H04W52/367H04W72/02H04W72/04H04W76/10H04W88/08
    • An apparatus and method for assigning subchannel(s) for communication between frequency agile mobile station(s) and a frequency agile base station. A received power level may be identified for each subcarrier in a set of subcarriers available for data transmission. A minimum power level needed to establish communications may be allocated. A detection threshold set to avoid interference with other devices currently transmitting on the set of subcarriers may be determined using the minimum uplink power level. A subset of subcarriers not already assigned may be selected where each subcarrier in the subset of subcarriers has a received power level that is less than the detection threshold. A subchannel that satisfies a bandwidth requirement may be formed where the subchannel consists of selected subcarriers in the set of subcarriers available for data transmission between the frequency agile mobile station(s) and the frequency agile base station.
    • 一种用于分配用于频率敏捷移动台和频率敏捷基站之间的通信的子信道的装置和方法。 可以为可用于数据传输的一组子载波中的每个子载波识别接收功率电平。 可以分配建立通信所需的最小功率级别。 可以使用最小上行链路功率电平来确定设置为避免与在该组子载波上当前发送的其他设备的干扰的检测阈值。 可以选择未分配的子载波的子集,其中子载波子集中的每个子载波具有小于检测阈值的接收功率电平。 可以形成满足带宽需求的子信道,其中子信道由可用于频率敏捷移动台和频率敏捷基站之间的数据传输的子载波组中的选择的子载波组成。
    • 9. 发明授权
    • Cache validating SCIT DNS server
    • 缓存验证SCIT DNS服务器
    • US08356106B2
    • 2013-01-15
    • US12695686
    • 2010-01-28
    • Arun Sood
    • Arun Sood
    • G06F15/173
    • H04L61/1511H04L29/12066H04L67/2852H04L2463/145
    • A cache validating SCIT-DNS Server including a server cluster, a cache copy, a controller and a validation module. Each of the servers in the server cluster uses a DNS mapping cache which maps DNS name(s) to record entry(ies). The cache copy maintains an image of DNS mapping cache(s). The controller manages the state of servers. States include a live spare state; an exposed state; a quiescent state; and a self-cleansing state. The validation module validates DNS entry(s) using a retriever module and a comparisons module. Retriever module retrieves an independent record entry associated with a selected DNS name from an external DNS resolver. The comparison module compares the independent record entry retrieved by the retriever module with the record entry associated with the selected DNS name residing in the cache copy. The validation module may cause server(s) to take an affirmative action in response to detected validation error(s).
    • 验证SCIT-DNS服务器的缓存,包括服务器集群,缓存副本,控制器和验证模块。 服务器集群中的每个服务器都使用DNS映射缓存,它将DNS名称映射到记录条目。 缓存副本维护DNS映射缓存的映像。 控制器管理服务器的状态。 国家包括现场备用状态; 曝光状态; 静止状态; 和自我清洁的状态。 验证模块使用检索模块和比较模块验证DNS条目。 检索模块从外部DNS解析器检索与所选DNS名称相关联的独立记录条目。 比较模块将检索模块检索到的独立记录条目与驻留在缓存副本中的所选DNS名称相关联的记录条目进行比较。 验证模块可能导致服务器响应于检测到的验证错误采取肯定行动。
    • 10. 发明授权
    • Self-cleansing secure DNS server
    • 自洁式安全DNS服务器
    • US08260963B2
    • 2012-09-04
    • US12695710
    • 2010-01-28
    • Yih HuangArun SoodDavid Arsenault
    • Yih HuangArun SoodDavid Arsenault
    • G06F15/16
    • H04L63/1416H04L29/12066H04L61/1511H04L63/1441
    • Disclosed is a self-cleansing intrusion tolerance-domain name systems system comprising at least three DNS servers, at least four storage systems accessible by the DNS servers, a communications link, a message transfer mechanism, and a self-cleansing mechanism. The storage systems include at least three online storage systems and at least one offline storage system. The communications link can connect the DNS servers with the storage systems, as well as connect the DNS servers with a local area network, which can connect the DNS servers with an external network. The message transfer mechanism can rotate the DNS servers into a plurality of roles, including a primary role, a secondary role, a designated role, and a self-cleansing role. The self-cleansing mechanism can be used to perform the self-cleansing role.
    • 公开了一种自清洁侵入容忍域名系统系统,其包括至少三个DNS服务器,由DNS服务器可访问的至少四个存储系统,通信链路,消息传送机制和自清洁机制。 存储系统包括至少三个在线存储系统和至少一个离线存储系统。 通信链路可以将DNS服务器与存储系统连接,并将DNS服务器与局域网相连,可以将DNS服务器与外部网络连接起来。 消息传送机制可以将DNS服务器旋转成多个角色,包括主要角色,辅助角色,指定角色和自我清除角色。 自我清洁机制可用于执行自洁净作用。