会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Providing and accessing data in a standard-compliant manner
    • 以符合标准的方式提供和访问数据
    • US09432407B1
    • 2016-08-30
    • US12978981
    • 2010-12-27
    • Eric J. BrandwineStephen E. Schmidt
    • Eric J. BrandwineStephen E. Schmidt
    • H04L29/06H04L29/08H04M3/22
    • H04L63/30H04L63/10H04L63/308H04L67/2819H04L67/2823H04M3/2281
    • In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be intercepted in response to a request for information from a second entity. The method may include converting the intercepted data from a first format to a second format, the second format compliant with a standard for providing intercepted data to the second entity. The method may include storing, in one or more memory units, the intercepted communication data in the second format. The one or more memory units may be part of a subset of a plurality of computing resources designated for use by the first entity. The method may include storing audit data providing a record of a chain of custody of the intercepted communication data. The method may include providing access to a portion of the stored intercepted communication data in the second format to the second entity.
    • 在某些实施例中,计算机实现的方法包括接收与第一实体相关联的被拦截的数据。 截取的数据可以响应于来自第二实体的信息请求而被拦截。 该方法可以包括将截取的数据从第一格式转换为第二格式,第二格式符合用于向第二实体提供截取的数据的标准。 该方法可以包括在一个或多个存储器单元中以第二格式存储截获的通信数据。 一个或多个存储器单元可以是指定为由第一实体使用的多个计算资源的子集的一部分。 该方法可以包括存储提供被截取的通信数据的保管链的记录的审计数据。 该方法可以包括向第二实体提供对以第二格式存储的截取的通信数据的一部分的访问。
    • 3. 发明授权
    • Selecting updates for deployment to a programmable execution service application
    • 选择更新部署到可编程执行服务应用程序
    • US08839222B1
    • 2014-09-16
    • US13238893
    • 2011-09-21
    • Eric J. BrandwineJoseph E. FitzgeraldMarvin M. TheimerBenjamin W. Mercier
    • Eric J. BrandwineJoseph E. FitzgeraldMarvin M. TheimerBenjamin W. Mercier
    • G06F9/45
    • G06F8/65G06F11/3668
    • A test environment is created for use in selecting updates for deployment to a programmable execution service (“PES”) application. The test environment is created in one embodiment by replicating a production network and one or more production virtual machine instances executing the PES application. Once the test environment has been created, the test environment is utilized to test and select updates for deployment to the PES application. The updates may be selected by deploying the updates to the test environment and using the test environment to determine whether the deployed updates are compatible with the PES application, permit the PES application to continue to operate performantly, and/or permit the PES application to meet one or more business performance metrics. Once the updates have been selected, the updates may be applied to production virtual machine instances executing the PES application.
    • 创建测试环境用于选择更新以部署到可编程执行服务(“PES”)应用程序。 在一个实施例中,通过复制生产网络和执行PES应用的一个或多个生产虚拟机实例来创建测试环境。 一旦创建了测试环境,测试环境就被用来测试和选择更新部署到PES应用程序。 可以通过将更新部署到测试环境并使用测试环境来确定所部署的更新是否与PES应用兼容,允许PES应用继续运行,和/或允许PES应用会议 一个或多个业务绩效指标。 一旦选择了更新,可以将更新应用于执行PES应用的生产虚拟机实例。
    • 7. 发明授权
    • Network data transmission auditing
    • 网络数据传输审计
    • US08555383B1
    • 2013-10-08
    • US12892665
    • 2010-09-28
    • Bradley E. MarshallCharles D. PhillipsEric J. Brandwine
    • Bradley E. MarshallCharles D. PhillipsEric J. Brandwine
    • H04L29/06
    • H04L63/20H04L69/22
    • Network computing systems may implement data loss prevention (DLP) techniques to reduce or prevent unauthorized use or transmission of confidential information or to implement information controls mandated by statute, regulation, or industry standard. Implementations of network data transmission analysis systems and methods are disclosed that can use contextual information in a DLP policy to monitor data transmitted via the network. The contextual information may include information based on a network user's organizational structure or services or network infrastructure. Some implementations may detect bank card information in network data transmissions. Some of the systems and methods may be implemented on a virtual network overlaid on one or more intermediate physical networks that are used as a substrate network.
    • 网络计算系统可以实施数据丢失预防(DLP)技术,以减少或阻止未经授权的使用或传输机密信息或执行法规,法规或行业标准所规定的信息控制。 公开了可以使用DLP策略中的上下文信息来监视经由网络发送的数据的网络数据传输分析系统和方法的实现。 上下文信息可以包括基于网络用户的组织结构或服务或网络基础设施的信息。 一些实现可以在网络数据传输中检测银行卡信息。 一些系统和方法可以在覆盖在用作衬底网络的一个或多个中间物理网络上的虚拟网络上实现。
    • 8. 发明授权
    • Resource placement templates for virtual networks
    • 用于虚拟网络的资源放置模板
    • US08484353B1
    • 2013-07-09
    • US12892850
    • 2010-09-28
    • Don JohnsonEric J. BrandwineMarvin M. TheimerSwaminathan Sivasubramanian
    • Don JohnsonEric J. BrandwineMarvin M. TheimerSwaminathan Sivasubramanian
    • G06F15/173
    • H04L47/70G06F9/5077G06F21/53G06F2221/2149H04L67/10
    • With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware. For example, virtualization technologies can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing one or more virtual machines simulated in software by the single physical computing machine, with each virtual machine acting as a distinct logical computing system. In addition, as routing can be accomplished through software, additional network setup flexibility can be provided to the virtual network in comparison with hardware-based routing. In some implementations, virtual network setup can be abstracted through the use of resource placement templates, allowing users to create virtual networks compliant with a customer's networking policies without necessarily having knowledge of what those policies are.
    • 随着虚拟化技术的出现,现在可以使用商品硬件来模拟这些网络的网络和路由。 例如,虚拟化技术可以被适配为允许单个物理计算机器在多个虚拟网络之间共享,通过提供由单个物理计算机器以软件模拟的一个或多个虚拟机,每个虚拟机充当不同的逻辑计算系统 。 另外,由于可以通过软件实现路由,与基于硬件的路由相比,可以向虚拟网络提供额外的网络设置灵活性。 在一些实现中,可以通过使用资源放置模板来抽象虚拟网络设置,从而允许用户创建符合客户网络策略的虚拟网络,而不必知道这些策略是什么。