会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Automated generation of configuration elements of an information technology system
    • 自动生成信息技术系统的配置元素
    • US08028334B2
    • 2011-09-27
    • US11120678
    • 2005-05-03
    • Dmitry AndreevPaul G. GreensteinGalina GruninGregory Vilshansky
    • Dmitry AndreevPaul G. GreensteinGalina GruninGregory Vilshansky
    • G06F29/06
    • H04L63/0263H04L67/12
    • A firewall rule generation method, a load balancing rule generation method, and a wrapper generation method, for an Information Technology (IT) system, associated computer program products, and an associated processes for integrating computing infrastructure. The firewall rule generation method generates firewall rules allowing data transmission between a computer and a client, and subsequently assigns the firewall rules to firewalls of the IT system. The load balancing rule generation method assigns a load balancing mechanism to a load balanced group to which execution of an application is assigned, wherein the load balanced group has servers therein. For a client and computer having a communication protocol therebetween that is not allowed by a security policy, the wrapper generation method generates a communication protocol wrapper that opens a Transmission Control Protocol (TCP) connection between the client and the computer such that the TCP connection is allowed by the security policy.
    • 用于信息技术(IT)系统,相关联的计算机程序产品以及用于集成计算基础设施的关联过程的防火墙规则生成方法,负载平衡规则生成方法和包装器生成方法。 防火墙规则生成方法生成防火墙规则,允许计算机和客户端之间的数据传输,然后将防火墙规则分配给IT系统的防火墙。 负载平衡规则生成方法将负载平衡机制分配给分配了应用的执行的负载平衡组,其中负载平衡组在其中具有服务器。 对于其间具有安全策略不允许的通信协议的客户端和计算机,包装器生成方法生成通信协议包装器,其在客户端和计算机之间打开传输控制协议(TCP)连接,使得TCP连接为 允许的安全策略。
    • 4. 发明申请
    • Method and system for optimally scheduling user activities related to web applications
    • 用于最佳调度与Web应用程序相关的用户活动的方法和系统
    • US20070100676A1
    • 2007-05-03
    • US11260739
    • 2005-10-27
    • Dmitry AndreevPaul GreensteinGalina GruninGregory Vilshansky
    • Dmitry AndreevPaul GreensteinGalina GruninGregory Vilshansky
    • G06F15/02
    • G06Q10/06G06Q10/0631G06Q10/10
    • A method and system for optimally scheduling an activity managed by a web application. Date and time ranges are initialized with predefined values. A tentative start date included in the date range and a tentative start time included in the time range are automatically calculated, and are included in a tentative schedule for the activity. A time period is determined by the tentative schedule and a duration of the activity. The automatic calculation prevents the time period from overlapping a time interval during which the web application is to experience a peak load. The tentative schedule is presented to the user via the interface, and is recalculated and redisplayed in response to the user updating a load-related parameter. The user selects a final schedule, which is the tentative schedule or a user-specified schedule different from the tentative schedule.
    • 一种用于最佳地安排由web应用程序管理的活动的方法和系统。 日期和时间范围用预定义值初始化。 包括在日期范围内的暂定开始日期和包括在时间范围内的暂定开始时间被自动计算,并被包括在活动的暂定时间表中。 时间段由暂定时间表和活动的持续时间决定。 自动计算可防止Web应用程序遇到峰值负载的时间间隔重叠的时间段。 通过接口向用户呈现临时调度,并响应于用户更新负载相关参数而重新计算和重新显示。 用户选择最终进度表,这是暂定时间表,也可以是与暂定时间表不同的用户指定日程表。
    • 6. 发明授权
    • System and method of facilitating the identification of a computer on a network
    • 促进网络上计算机识别的系统和方法
    • US08621229B2
    • 2013-12-31
    • US13410802
    • 2012-03-02
    • Dmitry AndreevGalina GruninGregory Vilshansky
    • Dmitry AndreevGalina GruninGregory Vilshansky
    • H04L29/06
    • H04L63/0876G06F21/60H04L63/08H04L63/10H04L63/1425H04M3/42059
    • A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack.
    • 提供一种用于便于识别网络中的攻击计算机的系统和方法。 尝试登录到网络应用程序的用户可以在登录之前呈现屏幕,其中列出了获得对应用程序的访问权限的先决条件。 如果用户同意前提条件,则将安全模块下载到用户计算机并执行,其收集各种配置设置并将收集的信息发送到预定目的地。 安全模块还可以尝试通过计算机中的调制解调器对预定目的地进行呼叫,以在预定目的地应答时引起主叫ID数据的注册。 一旦安全检查完成,登录可以继续进行网络应用程序。 可以存储由安全模块收集的任何数据供以后的召回和使用以在发生攻击的情况下识别计算机。
    • 8. 发明申请
    • METHOD AND SYSTEM FOR SEARCHING AND RETRIEVING REUSABLE ASSETS
    • 搜索和回收可回收资产的方法和系统
    • US20080189261A1
    • 2008-08-07
    • US11670577
    • 2007-02-02
    • Dmitry AndreevThomas Michael DauffenbachGalina GruninGregory Vilshansky
    • Dmitry AndreevThomas Michael DauffenbachGalina GruninGregory Vilshansky
    • G06F17/30
    • G06F17/3097Y10S707/99933
    • A method and system for searching and retrieving reusable assets is disclosed. An index file in a database stores reusable assets. A search request history in the database stores past search requests and corresponding past search results. A search program performs a search upon receiving a new search request within the index file and generates a new search result. The search program correlates past search requests to the new search request by comparing search terms in past search requests to search terms in the new search request. Search terms in past search requests are replaced with semantically similar terms based on taxonomy level and synonyms and results of highly correlated past search requests are added to the new search result. Reusability of each reusable asset in the new search result is appraised.
    • 披露了一种用于搜索和检索可重用资产的方法和系统。 数据库中的索引文件存储可重用资产。 数据库中的搜索请求历史记录存储过去的搜索请求和相应的过去的搜索结果。 搜索程序在索引文件中接收到新的搜索请求并执行搜索,并生成新的搜索结果。 搜索程序通过将过去搜索请求中的搜索词与新搜索请求中的搜索词进行比较,将过去的搜索请求与新的搜索请求相关联。 过去搜索请求中的搜索词被替换为基于分类级别的语义相似的术语,并将高度相关的过去搜索请求的同义词和结果添加到新的搜索结果中。 对新的搜索结果中的每个可重用资产的可重用性进行了评估。
    • 9. 发明申请
    • METHOD AND SYSTEM FOR PREVENTING WEB CRAWLING DETECTION
    • 防止网络抓取检测的方法和系统
    • US20080183889A1
    • 2008-07-31
    • US11669322
    • 2007-01-31
    • Dmitry AndreevGalina GruninGregory Vilshansky
    • Dmitry AndreevGalina GruninGregory Vilshansky
    • G06F15/173
    • H04L67/2814H04L29/06H04L29/12339H04L61/2503H04L67/02
    • A method and system for preventing a detection of web crawling. A randomizing HTTP proxy server receives a first request from a web crawler to scan a website and forwards the first request to a randomly selected first proxy computer. The first proxy computer utilizes a first network address translation (NAT)-enabled router to forward the first request to the website. A NAT algorithm associates a first source Internet Protocol (IP) address with the first request. The randomizing HTTP proxy server receives a second web crawler-initiated request to scan the website and forwards the second request to a randomly selected second proxy computer. The second proxy computer utilizes a second NAT-enabled router to forward the second request to the website. The NAT algorithm associates a second source IP address with the second request. The web server identifies the first and second source IP addresses as being different.
    • 一种用于防止网络爬行检测的方法和系统。 随机的HTTP代理服务器接收来自网络爬虫的第一请求以扫描网站并将第一请求转发到随机选择的第一代理计算机。 第一代理计算机利用第一网络地址转换(NAT)的路由器将第一请求转发到网站。 NAT算法将第一源Internet协议(IP)地址与第一请求相关联。 所述随机化HTTP代理服务器接收第二网络爬虫发起的请求以扫描所述网站并将所述第二请求转发到随机选择的第二代理计算机。 第二代理计算机利用第二个启用NAT的路由器将第二个请求转发到网站。 NAT算法将第二个源IP地址与第二个请求相关联。 Web服务器将第一和第二源IP地址识别为不同。
    • 10. 发明申请
    • Method and system for predicting user activity levels associated with an application
    • 用于预测与应用程序相关联的用户活动级别的方法和系统
    • US20070130097A1
    • 2007-06-07
    • US11292182
    • 2005-12-01
    • Dmitry AndreevPaul GreensteinGalina GruninGregory Vilshansky
    • Dmitry AndreevPaul GreensteinGalina GruninGregory Vilshansky
    • G06N5/02
    • G06F11/3447G06F11/3409G06F2201/87Y10S707/99943
    • A method and system for predicting a user activity level associated with an application. An activity level is a number of transactions performed by users utilizing the application per time period or a number of users utilizing the application per time period. Measurements of activity levels are assigned to a user activity metric (UAM) variable, and associated values are assigned to a set of factors. At least one correlation coefficient between each factor and the UAM is calculated. In response to a maximum correlation coefficient associated with a factor being less than a pre-defined threshold, the factor is excluded from the set of factors to facilitate forming a subset of factors associated with correlation coefficients whose absolute values are greater than or equal to the pre-defined threshold. A regression model utilizing the subset is generated to predict an activity level.
    • 一种用于预测与应用程序相关联的用户活动级别的方法和系统。 活动级别是由每个时间段利用应用的用户执行的一些交易或者每个时间段利用该应用的多个用户。 将活动级别的度量分配给用户活动度量(UAM)变量,并将关联值分配给一组因素。 计算每个因素与UAM之间的至少一个相关系数。 响应于与因子小于预定义阈值相关联的最大相关系数,该因子被排除在一组因素之外,以便于形成与相关系数相关联的因子子集,其相关系数的绝对值大于或等于 预定义阈值。 生成利用该子集的回归模型来预测活动水平。