会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Peer to peer network
    • 对等网络
    • US07343418B2
    • 2008-03-11
    • US10161428
    • 2002-06-03
    • Cormac E. Herley
    • Cormac E. Herley
    • G06F15/16
    • H04L67/104H04L67/1063H04L67/1082
    • A system and method for data distribution is disclosed. A bulletin board is employed to maintain a list of requests from nodes in the system. The requests indicate data requested and identify the node making the request. Nodes are able to post requests for data as long as they maintain a minimum performance level. Additionally, the nodes periodically check in with the bulletin board and receive the list of requests from the bulletin board. On determining to satisfy a particular request by a node, the node (serving node) contacts a requesting node (identified in the request) and transfers the requested data to the requesting node. After successful completion of the transfer, the requesting node reports to the bulletin board that the node has filled the request and the request is removed from the list of requests.
    • 公开了一种用于数据分配的系统和方法。 采用公告牌来维护系统中节点的请求列表。 请求指示请求的数据,并标识发出请求的节点。 节点能够发布数据请求,只要它们保持最低的性能水平。 此外,节点还可以使用公告板定期检查并接收公告板上的请求列表。 在确定满足节点的特定请求时,节点(服务节点)联系请求节点(在请求中标识)并将请求的数据传送到请求节点。 在成功完成传输之后,请求节点向公告板报告节点填写了请求,并且请求从请求列表中移除。
    • 6. 发明申请
    • Use of Popularity Information to Reduce Risk Posed by Guessing Attacks
    • 使用人气信息降低猜测攻击风险
    • US20120110668A1
    • 2012-05-03
    • US12912782
    • 2010-10-27
    • Stuart E. SchechterCormac E. HerleyMichael D. Mitzenmacher
    • Stuart E. SchechterCormac E. HerleyMichael D. Mitzenmacher
    • G06F21/00
    • G06F21/00G06F21/46
    • A popularity determination module (PDM) is described which reduces the effectiveness of statistical guessing attacks. The PDM operates by receiving a password (or other secret information item) from a user. The PDM uses a model to determine whether the password is popular among a group of users. If so, the PDM may ask the user to select another password. In one implementation, the model corresponds to a probabilistic model, such a count-min sketch model. The probabilistic model provides an upper-bound assessment of a number of times that a password has been encountered. Further, the probabilistic model provides false positives (in which passwords are falsely assessed as popular) at a rate that exceeds a prescribed minimum rate. The false positives are leveraged to reduce the effectiveness of statistical guessing attacks by malicious entities.
    • 描述了流行度确定模块(PDM),其降低了统计猜测攻击的有效性。 PDM通过从用户接收密码(或其他秘密信息项)来操作。 PDM使用模型来确定密码在一组用户中是否流行。 如果是这样,PDM可能会要求用户选择另一个密码。 在一个实现中,模型对应于概率模型,例如计数最小素描模型。 概率模型提供了密码遇到次数的上限评估。 此外,概率模型以超过规定的最低利率的速率提供误报(其中密码被错误地评估为流行)。 利用假阳性来降低恶意实体的统计猜测攻击的有效性。
    • 8. 发明授权
    • Distributing data in a peer to peer network
    • 在对等网络中分发数据
    • US07734678B2
    • 2010-06-08
    • US12045512
    • 2008-03-10
    • Cormac E. Herley
    • Cormac E. Herley
    • G06F15/16G06F15/173G06F7/00G06F17/00G06F17/30
    • H04L67/104H04L67/1063H04L67/1082
    • A system and method for data distribution is disclosed. A bulletin board is employed to maintain a list of requests from nodes in the system. The requests indicate data requested and identify the node making the request. Nodes are able to post requests for data as long as they maintain a minimum performance level. Additionally, the nodes periodically check in with the bulletin board and receive the list of requests from the bulletin board. On determining to satisfy a particular request by a node, the node (serving node) contacts a requesting node (identified in the request) and transfers the requested data to the requesting node. After successful completion of the transfer, the requesting node reports to the bulletin board that the node has filled the request and the request is removed from the list of requests.
    • 公开了一种用于数据分配的系统和方法。 采用公告牌来维护系统中节点的请求列表。 请求指示请求的数据,并标识发出请求的节点。 节点能够发布数据请求,只要它们保持最低的性能水平。 此外,节点还可以使用公告板定期检查并接收公告板上的请求列表。 在确定满足节点的特定请求时,节点(服务节点)联系请求节点(在请求中标识)并将请求的数据传送到请求节点。 在成功完成传输之后,请求节点向公告板报告节点填写了请求,并且请求从请求列表中移除。
    • 10. 发明授权
    • Automatic tracking of user data and reputation checking
    • 自动跟踪用户数据和信誉检查
    • US07516418B2
    • 2009-04-07
    • US11421724
    • 2006-06-01
    • Cormac E. HerleyDinei A. Florencio
    • Cormac E. HerleyDinei A. Florencio
    • G06F3/048G06F3/03
    • G06Q10/00G06F21/6263Y10S707/99933Y10S707/99934Y10S707/99935Y10S707/99936Y10S707/99937
    • A unique system and method that facilitate automatic tracking of user data and providing on-demand site or merchant reputation information is provided. The system and method involve monitoring user input such as by keystrokes over a period of time and forming a long continuous string of characters. The string of characters can be monitored for repeating substrings or non-repeating substrings that indicate sensitive user information such as SSN or credit card number (CCN). The substrings can be displayed to the user in a digest form and order according to frequency of occurrence, for example. Thus, the user can readily view where and when their sensitive information has been entered. In addition, the typing of certain substrings such as CCNs or other sensitive field data can trigger a reputation service to retrieve the reputation data for the current site or merchant to mitigate dealing with fraudulent sites or merchants.
    • 提供了一种便于自动跟踪用户数据并提供点播站点或商户信誉信息的独特系统和方法。 系统和方法涉及监视用户输入,例如通过一段时间的击键并形成长的连续字符串。 可以监视字符串,用于指示敏感的用户信息(如SSN或信用卡号码(CCN))的重复子字符串或非重复子字符串。 例如,子串可以以摘要形式显示给用户,并根据发生频率进行排序。 因此,用户可以容易地查看其敏感信息的输入位置和时间。 此外,某些子字符串(如CCN或其他敏感字段数据)的输入可以触发信誉服务以检索当前站点或商家的信誉数据,以减轻对欺诈性站点或商家的处理。