会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明申请
    • Automatic generation of embedded signatures for duplicate detection on a public network
    • 自动生成嵌入式签名,用于公共网络上的重复检测
    • US20090299994A1
    • 2009-12-03
    • US12156370
    • 2008-05-30
    • Balachander KrishnamurthySaurabh KumarLakshminarayanan Subramanian
    • Balachander KrishnamurthySaurabh KumarLakshminarayanan Subramanian
    • G06F17/30
    • G06F17/30663G06F21/552
    • In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.
    • 根据本发明的一个方面,公开了一种用于构建嵌入式签名的方法和系统,以便于事后检测敏感数据的泄漏。 所述泄漏检测机构包括:1)识别包含敏感数据的电子文档中的至少一组单词,所述一组单词在电子文档的第一集合中具有低频率出现; 以及2)发送查询以搜索包含具有低发生频率的单词集合的任何电子文档的第二电子文档集合。 该泄漏检测机构至少具有以下优点:a)它是防篡改的; b)它避免了需要向敏感数据添加水印,c)即使在嵌入式签名被识别之前发生泄漏,它也可以用于定位敏感数据; 和d)它可以用于检测嵌入式签名,而不管数据是静态还是动态呈现。
    • 36. 发明申请
    • Method and apparatus for data network sampling
    • 数据网络采样方法和装置
    • US20070019548A1
    • 2007-01-25
    • US11258444
    • 2005-10-25
    • Balachander Krishnamurthy
    • Balachander Krishnamurthy
    • H04L12/26
    • H04L63/1408H04L43/022
    • Disclosed is an informed sampling technique for biasing a sample data set toward network data of interest for a particular application. Network data received at a network node (for example at a rate which is greater than a sampling rate for which the network node is configured) is chosen to be included in a sample set based on one or more predetermined signatures which are chosen to bias the sample set toward network data of interest for a particular application. For example, the sample set may be biased to include data of interest for fraud detection, spam detection, and intrusion detection. The particular signature(s) may be predefined by a user, or may be automatically generated by another network application. The invention may be implemented at various levels and nodes of a network. For example, the informed sampling may be implemented at a traffic monitoring function of a network router, a flow collector which receives network flow data from the router, or both.
    • 公开了一种知情的采样技术,用于将样本数据集偏向特定应用的感兴趣的网络数据。 选择在网络节点处接收的网络数据(例如,以比其网络节点配置的采样率大的速率)基于一个或多个预定签名被包括在样本集合中,所述预定签名被选择为偏置 样本设置为特定应用程序感兴趣的网络数据。 例如,样本集可能被偏置以包括用于欺诈检测,垃圾邮件检测和入侵检测的感兴趣的数据。 特定签名可以由用户预定义,或者可以由另一网络应用自动生成。 本发明可以在网络的各个级别和节点上实现。 例如,通知采样可以在网络路由器的流量监控功能,从路由器接收网络流数据的流收集器或二者实现。