会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 91. 发明授权
    • Adaptive responses to trickle-type denial of service attacks
    • 对涓流型拒绝服务攻击的适应性响应
    • US09195805B1
    • 2015-11-24
    • US13315175
    • 2011-12-08
    • Eric Jason Brandwine
    • Eric Jason Brandwine
    • G06F12/14G06F21/00G06F21/12
    • H04L63/1458G06F21/00G06F21/121
    • Various approaches are provided that are able to mitigate the effects of potential trickle-type denial of service (DoS) attacks or similar occurrences. Connection values such as the maximum number of concurrent connections and the timeout values for new connections can be adjusted dynamically in response to changes in operational state and/or an amount of suspicious activity. The suspicious activity can include, for example, a low rate of packets or bytes per unit time, repetitive small headers, unrecognized headers, and other such information. In some embodiments the changes are made iteratively to minimize the effect of the changes on legitimate requests. After the level of suspicious activity decreases, the connection values can iteratively be readjusted hack to normal operational values, in order to minimize any remaining portion of the potential attack.
    • 提供了各种方法,能够减轻潜在的涓流型拒绝服务(DoS)攻击或类似事件的影响。 响应于操作状态和/或可疑活动量的变化,可以动态地调整连接值,例如并发连接的最大数量和新连接的超时值。 可疑活动可以包括例如每单位时间的低速率的分组或字节,重复的小报头,无法识别的报头以及其他这样的信息。 在一些实施例中,迭代地进行改变以使更改对合法请求的影响最小化。 在可疑活动级别减少之后,连接值可以迭代地重新调整到正常的操作值,以便最小化潜在攻击的任何剩余部分。
    • 93. 发明授权
    • Appliance backnets in dedicated resource environment
    • 专用资源环境中的设备后备网
    • US09112841B1
    • 2015-08-18
    • US12885283
    • 2010-09-17
    • Eric Jason BrandwineMarvin M. TheimerDon Johnson
    • Eric Jason BrandwineMarvin M. TheimerDon Johnson
    • H04L29/06G06F15/177
    • H04L41/5051H04L63/02H04L63/08H04L63/10H04L67/10H04L67/16
    • A backnet can be created within a dedicated private network of a customer that enables a distinct party to access and/or control a portion of the resources within the private network. In one example, a backnet includes a separate virtual interface for an appliance or other such resource that is not visible or accessible to the customer owning the customer cloud, but can be accessed by another appliance or component in the customer cloud, or an appliance vendor external to the customer cloud. While the customer can control the permission for the backnet, the vendor can control or implement the resources within the backnet in a way that is isolated from the customer. Usage of the backnet can be separately monitored and billed to the vendor, even though the resources are part of the dedicated customer cloud.
    • 可以在客户的专用专用网络内创建一个后端网,这使得一个不同的方可以访问和/或控制专用网络中的一部分资源。 在一个示例中,后端网络包括用于设备或其他此类资源的单独的虚拟接口,该客户端拥有客户云的客户不可见或可访问,但可由客户云中的其他设备或组件或设备供应商 在客户云外面。 虽然客户可以控制backnet的权限,但是供应商可以以与客户隔离的方式来控制或实现后端网络中的资源。 即使资源是专用客户云的一部分,后端网络的使用可以单独监控并向供应商支付。
    • 96. 发明授权
    • Managing private use of program execution capacity
    • 管理私人使用程序执行能力
    • US08924982B2
    • 2014-12-30
    • US12686273
    • 2010-01-12
    • Eric Jason BrandwineJames Alfred Gordon Greenfield
    • Eric Jason BrandwineJames Alfred Gordon Greenfield
    • G06F9/50
    • G06F9/466G06F9/5072G06Q20/085
    • Techniques are described for managing execution of programs, including using excess program execution capacity of one or more computing systems. For example, a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacity allocated for that user, with the private pool of excess capacity being available for priority use by that user. Such private excess capacity pools may further in some embodiments be provided in addition to a general, non-private excess computing capacity pool that is available for use by multiple users, optionally including users who are associated with the private excess capacity pools. In some such situations, excess computing capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess capacity may be terminated at any time if other preferred use for the excess capacity arises.
    • 描述了用于管理程序的执行的技术,包括使用一个或多个计算系统的多余的程序执行能力。 例如,可以基于为该用户分配的未使用的专用程序执行能力为用户维护过剩计算能力的专用池,其中超额容量的专用池可供该用户优先使用。 在一些实施例中,还可以提供这样的私人额外容量池,除了可供多个用户使用的一般非私有额外计算能力池之外,可选地包括与私有额外容量池相关联的用户。 在某些这种情况下,可以使临时计算能力可用于执行程序,使得如果出现超额容量的其他优选使用,则可以随时终止使用过剩容量执行的程序。