会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 45. 发明申请
    • FILE SYNCHRONIZATION METHOD, FILES SYNCHRONIZATION APPARATUS AND ELECTRONIC DEVICE
    • 文件同步方法,文件同步装置和电子装置
    • US20130339296A1
    • 2013-12-19
    • US14003314
    • 2012-03-06
    • Tianshu WangRong Yang
    • Tianshu WangRong Yang
    • G06F17/30
    • G06F17/30174H04L67/1095
    • A file synchronization method may comprise establishing a connection with a second electronic device and performing a first synchronization operation and/or a second synchronization operation. The first synchronization operation may comprise interacting with the second electronic device to synchronize a first synchronization file from the second electronic device to the first electronic device, and to record a first piece of file source information for the first synchronization file, wherein the first piece of file source information is to identify that the first synchronization file comes from the second electronic device. The second synchronization operation may comprise selecting a second synchronization file from the first electronic device, and interacting with the second electronic device to synchronize the second synchronization file to the second electronic device, wherein the second synchronization file includes a second piece of file source information to identify that the second synchronization file corresponds to the second electronic device.
    • 文件同步方法可以包括建立与第二电子设备的连接并执行第一同步操作和/或第二同步操作。 第一同步操作可以包括与第二电子设备交互以使来自第二电子设备的第一同步文件与第一电子设备同步,并记录第一同步文件的第一文件源信息,其中第一同步文件 文件源信息是识别第一同步文件来自第二电子设备。 第二同步操作可以包括从第一电子设备选择第二同步文件,并与第二电子设备交互以使第二同步文件与第二电子设备同步,其中第二同步文件包括第二文件源信息, 识别第二同步文件对应于第二电子设备。
    • 46. 发明申请
    • ELECTRONIC APPARATUS AND OBJECT PROCESSING METHOD THEREOF
    • 电子设备及其对象处理方法
    • US20130275912A1
    • 2013-10-17
    • US13976654
    • 2011-12-30
    • Zhiqiang HeHaisheng XuRong YangMing CaiHaixin Chai
    • Zhiqiang HeHaisheng XuRong YangMing CaiHaixin Chai
    • G06F3/0484
    • G06F3/0484G06F3/048G06F8/38H04M1/72522H04M1/72583
    • Semiconductor devices and methods for manufacturing the same are disclosed. In one embodiment, the semiconductor device comprises a semiconductor substrate; an insulating layer located on the semiconductor substrate; a semiconductor body located on the insulating layer; a cavity formed in the semiconductor body and into the insulating layer; source/drain regions abutting opposite first side faces of the semiconductor body; gates located on opposite second side faces of the semiconductor body; a channel layer interposed between the respective second side faces and the cavity; and a super-steep-retrograded-well and a halo super-steep-retrograded-well formed in the channel layer. The super-steep-retrograded-well and the halo super-steep-retrograded-well have opposite dopant polarities.
    • 公开了半导体装置及其制造方法。 在一个实施例中,半导体器件包括半导体衬底; 位于所述半导体衬底上的绝缘层; 位于所述绝缘层上的半导体本体; 在半导体本体中形成并进入绝缘层的空腔; 源极/漏极区域邻接半导体本体的相对的第一侧面; 位于半导体本体的相对的第二侧面上的门; 插入在相应的第二侧面和空腔之间的沟道层; 并且在通道层中形成了一个超级陡峭的后退井和一个光晕超陡峭的回归井。 超级陡峭后退井和光晕超陡倾斜井具有相反的掺杂极性。
    • 47. 发明申请
    • Optimal Strategies in Security Games
    • 安全游戏中的最佳策略
    • US20130273514A1
    • 2013-10-17
    • US13838466
    • 2013-03-15
    • Milind TambeFernando OrdóñezRong YangZhengyu YinMatthew BrownBo AnChristopher Kiekintveld
    • Milind TambeFernando OrdóñezRong YangZhengyu YinMatthew BrownBo AnChristopher Kiekintveld
    • G09B5/00
    • G09B5/00G06N7/005G07F17/32
    • Different solution methodologies for addressing problems or issues when directing security domain patrolling strategies according to attacker-defender Stackelberg security games. One type of solution provides for computing optimal strategy against quantal response in security games, and includes two algorithms, the GOSAQ and PASAQ algorithms. Another type of solution provides for a unified method for handling discrete and continuous uncertainty in Bayesian Stackelberg games, and introduces the HUNTER algorithm. Another solution type addresses multi-objective security games (MOSG), combining security games and multi-objective optimization. MOSGs have a set of Pareto optimal (non-dominated) solutions referred to herein as the Pareto frontier. The Pareto frontier can be generated by solving a sequence of constrained single-objective optimization problems (CSOP), where one objective is selected to be maximized while lower bounds are specified for the other objectives. Specific examples of applications to security domains are described.
    • 根据攻击者防御者Stackelberg安全游戏指导安全域巡逻策略时,解决问题或问题的不同解决方法。 一种类型的解决方案提供了针对安全游戏中的量化响应的计算最优策略,并且包括两种算法:GOSAQ和PASAQ算法。 另一种类型的解决方案提供了一种用于处理贝叶斯Stackelberg游戏中离散和连续不确定性的统一方法,并介绍了HUNTER算法。 另一种解决方案类型涉及多目标安全游戏(MOSG),结合安全游戏和多目标优化。 MOSG具有一组帕累托最优(非主导)解决方案,这里称为帕累托前沿。 帕累托边界可以通过解决一系列约束单目标优化问题(CSOP)来生成,其中一个目标被选择为最大化,而下限被指定用于其他目标。 描述了对安全域的应用的具体示例。
    • 48. 发明授权
    • White list creation in behavior monitoring system
    • 白名单创建行为监控系统
    • US08161552B1
    • 2012-04-17
    • US12565585
    • 2009-09-23
    • Chih Yao SunYi LuDibin TangRuifeng YangPeng ShuRong Yang
    • Chih Yao SunYi LuDibin TangRuifeng YangPeng ShuRong Yang
    • G06F11/00
    • G06F21/566G06F2221/033H04L63/145
    • A white list (or exception list) for a behavior monitoring system for detecting unknown malware on a computing device is maintained automatically without human intervention. A white list contains process IDs and other data relating to processes that are determined to be (or very likely be) free of malware. If a process is on this list, the rule matching operations of a conventional behavior monitor are not performed, thereby saving processing resources on the computing device. When a process start up is detected, the behavior monitor performs a series of checks or tests. If the process has all valid digital signatures and is not launched from a removable storage device (such as a USB key) and is not enabled to make any inbound or outbound connections, it is eligible for being on the white list. The white list is also automatically maintained by removing process IDs for processes that have terminated or which attempt to make a new outbound or inbound connection, such as a TCP/UDP connection. Scheduled integrity checks on the white list are also performed by examining the process stack for each process to ensure that there are no abnormal files in the process stack.
    • 用于检测计算设备上的未知恶意软件的行为监视系统的白名单(或例外列表)在没有人为干预的情况下自动维护。 白名单包含与被确定为(或很可能)没有恶意软件的进程有关的进程ID和其他数据。 如果一个进程在该列表中,则不执行常规行为监视器的规则匹配操作,从而在计算设备上保存处理资源。 当检测到进程启动时,行为监视器执行一系列检查或测试。 如果该进程具有所有有效的数字签名,并且未从可移动存储设备(例如USB密钥)启动,并且未启用进行任何入站或出站连接,则它有资格进入白名单。 白名单也通过删除已终止或尝试进行新的出站或入站连接(如TCP / UDP连接)的进程的进程ID自动维护。 白名单上的计划完整性检查也通过检查每个进程的进程堆栈来确保进程堆栈中没有异常文件。