会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Searching for information utilizing a probabilistic detector
    • 使用概率检测器搜索信息
    • US07730058B2
    • 2010-06-01
    • US11243924
    • 2005-10-05
    • Gaurav SareenMark Steven ManasseMartin AbadiMichael A. Isard
    • Gaurav SareenMark Steven ManasseMartin AbadiMichael A. Isard
    • G06F7/00G06F17/30
    • G06F17/30687
    • A probabilistic detector is utilized to query a database. Utilization of a probabilistic detector provides assurance with 100 per cent probability that a search expression in the query is not in the database index. The probabilistic detector is implemented in the form of a Bloom filter. The probabilistic detector is created by hashing expressions in the database index and mapping the resulting hash values into the probabilistic detector. Upon receiving a query, expressions of the query are hashed. The probabilistic detector is queried using these hash values. If the results of querying the probabilistic detector indicate that searched for information may be in the database, the database is not queried. If the results of querying the probabilistic detector indicate that the information may be in the database, the database is queried for the information using the original query. This technique is advantageous in mitigating detrimental effects of denial of service attacks.
    • 利用概率检测器查询数据库。 概率检测器的利用率提供了100%的可能性,即查询中的搜索表达式不在数据库索引中。 概率检测器以Bloom滤波器的形式实现。 概率检测器是通过在数据库索引中散列表达式并将生成的散列值映射到概率检测器中创建的。 在接收到查询后,查询的表达式将被哈希。 使用这些散列值查询概率检测器。 如果查询概率检测器的结果表明搜索到的信息可能在数据库中,则不会查询数据库。 如果查询概率检测器的结果表明信息可能在数据库中,则使用原始查询查询数据库中的信息。 这种技术有利于减轻拒绝服务攻击的有害影响。
    • 2. 发明授权
    • Memory bound functions for spam deterrence and the like
    • 用于垃圾邮件威慑的内存绑定功能等
    • US07149801B2
    • 2006-12-12
    • US10290879
    • 2002-11-08
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • G06F15/173H04K1/00
    • H04L63/126H04L51/12
    • A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    • 如果用户投入很少或没有成本,资源可能会被滥用。 例如,电子邮件滥用是猖獗的,因为发送电子邮件对发件人的成本可以忽略不计。 通过以中等昂贵的计算的形式引入人造成本,可能不鼓励这种滥用。 因此,电子邮件的发件人可能需要在电子邮件被接受之前几秒计算才能付款。 不幸的是,由于计算机系统之间的差异很大,对于具有高端系统的恶意用户来说,这种方法可能无效,对于具有低端系统的合法用户或者两者都是非常缓慢的。 从这个观察开始,我们确定了最近的计算机系统以相同的速度评估的适度硬的记忆绑定功能,我们解释如何使用它们来防止滥用。
    • 3. 发明申请
    • Searching for information utilizing a probabilistic detector
    • 使用概率检测器搜索信息
    • US20070078827A1
    • 2007-04-05
    • US11243924
    • 2005-10-05
    • Gaurav SareenMark ManasseMartin AbadiMichael Isard
    • Gaurav SareenMark ManasseMartin AbadiMichael Isard
    • G06F17/30
    • G06F17/30687
    • A probabilistic detector is utilized to query a database. Utilization of a probabilistic detector provides assurance with 100 per cent probability that a search expression in the query is not in the database index. The probabilistic detector is implemented in the form of a Bloom filter. The probabilistic detector is created by hashing expressions in the database index and mapping the resulting hash values into the probabilistic detector. Upon receiving a query, expressions of the query are hashed. The probabilistic detector is queried using these hash values. If the results of querying the probabilistic detector indicate that searched for information may be in the database, the database is not queried. If the results of querying the probabilistic detector indicate that the information may be in the database, the database is queried for the information using the original query. This technique is advantageous in mitigating detrimental effects of denial of service attacks.
    • 利用概率检测器查询数据库。 概率检测器的利用率提供了100%的可能性,即查询中的搜索表达式不在数据库索引中。 概率检测器以Bloom滤波器的形式实现。 概率检测器由数据库索引中的散列表达式创建,并将生成的散列值映射到概率检测器中。 在接收到查询后,查询的表达式将被哈希。 使用这些散列值查询概率检测器。 如果查询概率检测器的结果表明搜索到的信息可能在数据库中,则不查询数据库。 如果查询概率检测器的结果表明信息可能在数据库中,则使用原始查询查询数据库中的信息。 这种技术有利于减轻拒绝服务攻击的有害影响。
    • 9. 发明授权
    • Host accountability using unreliable identifiers
    • 使用不可靠的标识符托管问责制
    • US08185613B2
    • 2012-05-22
    • US12479882
    • 2009-06-08
    • Yinglian XieFang YuMartin Abadi
    • Yinglian XieFang YuMartin Abadi
    • G06F17/30
    • H04L63/1408H04L2463/144
    • An IP (Internet Protocol) address is a directly observable identifier of host network traffic in the Internet and a host's IP address can dynamically change. Analysis of traffic (e.g., network activity or application request) logs may be performed and a host tracking graph may be generated that shows hosts and their bindings to IP addresses over time. A host tracking graph may be used to determine host accountability. To generate a host tracking graph, a host is represented. Host representations may be application-dependent. In an implementation, application-level identifiers (IDs) such as user email IDs, messenger login IDs, social network IDs, or cookies may be used. Each identifier may be associated with a human user. These unreliable IDs can be used to track the activity of the corresponding hosts.
    • IP(互联网协议)地址是互联网中主机网络流量的直接可观察标识符,主机的IP地址可以动态更改。 可以执行流量分析(例如,网络活动或应用请求)日志,并且可以生成显示主机及其与IP地址的绑定的主机跟踪图。 可以使用主机跟踪图来确定主机责任。 要生成主机跟踪图,表示主机。 主机表示可能取决于应用程序。 在实现中,可以使用诸如用户电子邮件ID,信使登录ID,社交网络ID或cookie的应用级标识符(ID)。 每个标识符可以与人类用户相关联。 这些不可靠的ID可用于跟踪相应主机的活动。
    • 10. 发明授权
    • Memory conflict detection via mapping of the physical heap to control access permissions to the memory
    • 通过物理堆映射来检测内存冲突,以控制对内存的访问权限
    • US08180986B2
    • 2012-05-15
    • US12212025
    • 2008-09-17
    • Timothy HarrisMartin Abadi
    • Timothy HarrisMartin Abadi
    • G06F12/00
    • G06F12/145G06F9/528
    • A transactional memory system is described for reporting memory access violations which occur when memory accesses made from instructions within a transaction conflict with memory accesses to the same memory location made from a non-transactional instruction. In an embodiment this is achieved by creating two mappings of a physical heap being used by a thread. The thread (which may be part of a multi-threaded process) comprises instructions for both transactional and non-transactional accesses to the physical heap which may execute concurrently as part of that thread. One of the mappings is used for non-transactional memory accesses to the physical heap. The other mapping is used for transactional memory accesses to the physical heap. Access permissions associated with the mappings are controlled to enable attempted memory access violations to be detected and reported.
    • 描述了一种事务性存储器系统,用于报告存储器访问冲突的发生,当由事务内的指令进行的存储器访问与从非事务性指令进行的存储器访问的存储器访问冲突时发生。 在一个实施例中,这是通过创建由线程使用的物理堆的两个映射来实现的。 线程(可以是多线程进程的一部分)包括用于对物理堆的事务和非事务性访问的指令,该物理堆可以作为该线程的一部分同时执行。 其中一个映射用于对物理堆的非事务内存访问。 另一个映射用于对物理堆的事务内存访问。 控制与映射关联的访问权限,以便检测和报告尝试的内存访问冲突。