会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 81. 发明授权
    • Remote browsing session management
    • 远程浏览会话管理
    • US09374244B1
    • 2016-06-21
    • US13406112
    • 2012-02-27
    • Eric Jason Brandwine
    • Eric Jason Brandwine
    • H04L21/00
    • H04L21/00H04L61/1511H04L63/0823
    • A process is directed to the generation and processing of server identification data by a network computing provider. A client computing device transmits data identifying a server associated with a content source. The identification data can include a digital certificate signed by a third-party certificate authority, a DNS record from a third-party DNS server, etc. The network computing provider comprises one or more physical computing devices for processing the identification data received from any number of client computing devices. The network computing provider can alert the client computing device, content source, or DNS server when erroneous or potentially fraudulent identification data is detected. The network computing provider can also store the identification data and provide content sources and DNS servers with access to the identification data received from client computing devices.
    • 一个过程涉及由网络计算提供商生成和处理服务器标识数据。 客户端计算设备发送标识与内容源相关联的服务器的数据。 识别数据可以包括由第三方认证机构签名的数字证书,来自第三方DNS服务器的DNS记录等。网络计算提供者包括一个或多个物理计算设备,用于处理从任何数字接收到的识别数据 的客户端计算设备。 当检测到错误或潜在的欺骗性识别数据时,网络计算提供商可以警告客户端计算设备,内容源或DNS服务器。 网络计算提供商还可以存储识别数据,并且向内容源和DNS服务器提供对从客户端计算设备接收的识别数据的访问。
    • 82. 发明授权
    • Adaptive responses to trickle-type denial of service attacks
    • 对涓流型拒绝服务攻击的适应性响应
    • US09195805B1
    • 2015-11-24
    • US13315175
    • 2011-12-08
    • Eric Jason Brandwine
    • Eric Jason Brandwine
    • G06F12/14G06F21/00G06F21/12
    • H04L63/1458G06F21/00G06F21/121
    • Various approaches are provided that are able to mitigate the effects of potential trickle-type denial of service (DoS) attacks or similar occurrences. Connection values such as the maximum number of concurrent connections and the timeout values for new connections can be adjusted dynamically in response to changes in operational state and/or an amount of suspicious activity. The suspicious activity can include, for example, a low rate of packets or bytes per unit time, repetitive small headers, unrecognized headers, and other such information. In some embodiments the changes are made iteratively to minimize the effect of the changes on legitimate requests. After the level of suspicious activity decreases, the connection values can iteratively be readjusted hack to normal operational values, in order to minimize any remaining portion of the potential attack.
    • 提供了各种方法,能够减轻潜在的涓流型拒绝服务(DoS)攻击或类似事件的影响。 响应于操作状态和/或可疑活动量的变化,可以动态地调整连接值,例如并发连接的最大数量和新连接的超时值。 可疑活动可以包括例如每单位时间的低速率的分组或字节,重复的小报头,无法识别的报头以及其他这样的信息。 在一些实施例中,迭代地进行改变以使更改对合法请求的影响最小化。 在可疑活动级别减少之后,连接值可以迭代地重新调整到正常的操作值,以便最小化潜在攻击的任何剩余部分。
    • 83. 发明授权
    • Providing local secure network access to remote services
    • 提供本地安全网络访问远程服务
    • US09137209B1
    • 2015-09-15
    • US12332216
    • 2008-12-10
    • Eric Jason BrandwineDaniel T. CohnAndrew J. Doane
    • Eric Jason BrandwineDaniel T. CohnAndrew J. Doane
    • G06F15/173G06F15/177G06F15/16H04L29/06H04L12/46
    • H04L41/0806H04L12/4641H04L45/02H04L45/586H04L63/0272H04L67/02
    • Techniques are described for providing users with access to computer networks, such as to enable users to create computer networks that are provided by a remote configurable network service for use by the users. Such provided computer networks may be configured to be private computer networks accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. In addition, access to remote resource services may be configured and provided from such computer networks in various manners, such as to include a local access mechanism as part of a provided computer network that is configured to forward communications sent to the access mechanism to a particular remote resource service.
    • 描述了为用户提供对计算机网络的访问的技术,例如使得用户能够创建由远程可配置网络服务提供以供用户使用的计算机网络。 这样提供的计算机网络可以被配置为仅由创建它们的用户可访问的专用计算机网络,并且每个可以由可配置网络服务的客户端创建和配置为可扩展到客户端的现有计算机网络,例如 作为私人计算机网络扩展到客户端的现有专用计算机网络。 此外,可以以各种方式从这样的计算机网络配置和提供对远程资源服务的访问,例如包括作为所提供的计算机网络的一部分的本地访问机制,其被配置为将发送到访问机制的通信转发到特定的 远程资源服务。
    • 84. 发明授权
    • Appliance backnets in dedicated resource environment
    • 专用资源环境中的设备后备网
    • US09112841B1
    • 2015-08-18
    • US12885283
    • 2010-09-17
    • Eric Jason BrandwineMarvin M. TheimerDon Johnson
    • Eric Jason BrandwineMarvin M. TheimerDon Johnson
    • H04L29/06G06F15/177
    • H04L41/5051H04L63/02H04L63/08H04L63/10H04L67/10H04L67/16
    • A backnet can be created within a dedicated private network of a customer that enables a distinct party to access and/or control a portion of the resources within the private network. In one example, a backnet includes a separate virtual interface for an appliance or other such resource that is not visible or accessible to the customer owning the customer cloud, but can be accessed by another appliance or component in the customer cloud, or an appliance vendor external to the customer cloud. While the customer can control the permission for the backnet, the vendor can control or implement the resources within the backnet in a way that is isolated from the customer. Usage of the backnet can be separately monitored and billed to the vendor, even though the resources are part of the dedicated customer cloud.
    • 可以在客户的专用专用网络内创建一个后端网,这使得一个不同的方可以访问和/或控制专用网络中的一部分资源。 在一个示例中,后端网络包括用于设备或其他此类资源的单独的虚拟接口,该客户端拥有客户云的客户不可见或可访问,但可由客户云中的其他设备或组件或设备供应商 在客户云外面。 虽然客户可以控制backnet的权限,但是供应商可以以与客户隔离的方式来控制或实现后端网络中的资源。 即使资源是专用客户云的一部分,后端网络的使用可以单独监控并向供应商支付。
    • 87. 发明授权
    • Managing private use of program execution capacity
    • 管理私人使用程序执行能力
    • US08924982B2
    • 2014-12-30
    • US12686273
    • 2010-01-12
    • Eric Jason BrandwineJames Alfred Gordon Greenfield
    • Eric Jason BrandwineJames Alfred Gordon Greenfield
    • G06F9/50
    • G06F9/466G06F9/5072G06Q20/085
    • Techniques are described for managing execution of programs, including using excess program execution capacity of one or more computing systems. For example, a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacity allocated for that user, with the private pool of excess capacity being available for priority use by that user. Such private excess capacity pools may further in some embodiments be provided in addition to a general, non-private excess computing capacity pool that is available for use by multiple users, optionally including users who are associated with the private excess capacity pools. In some such situations, excess computing capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess capacity may be terminated at any time if other preferred use for the excess capacity arises.
    • 描述了用于管理程序的执行的技术,包括使用一个或多个计算系统的多余的程序执行能力。 例如,可以基于为该用户分配的未使用的专用程序执行能力为用户维护过剩计算能力的专用池,其中超额容量的专用池可供该用户优先使用。 在一些实施例中,还可以提供这样的私人额外容量池,除了可供多个用户使用的一般非私有额外计算能力池之外,可选地包括与私有额外容量池相关联的用户。 在某些这种情况下,可以使临时计算能力可用于执行程序,使得如果出现超额容量的其他优选使用,则可以随时终止使用过剩容量执行的程序。
    • 88. 发明授权
    • Selective contact between customers and customer service agents
    • 客户和客户服务代理商之间的选择性联系
    • US08873735B1
    • 2014-10-28
    • US13620441
    • 2012-09-14
    • Eric Jason BrandwineAndrew J. Doane
    • Eric Jason BrandwineAndrew J. Doane
    • H04M3/00
    • H04M3/523H04M3/5238H04M2203/408
    • A network-based service may generate notifications regarding items of interest to a user. A contact selection service may receive the notifications and generate a user interface for transmission of the notification to the user. The generated user interface may include a unique identifier and may further enable the user to submit user contact information to request contact with a service agent. The contact selection service may further pre-authorize contacts between users and customer service agents CSA. The unique identifier, and optionally the submitted user contact information, may be employed by the contact selection service to selectively determine which customer contact requests received by the contact selection service are pre-authorized for contact with a CSA and enables such contacts between customers and CSAs to proceed.
    • 基于网络的服务可以产生关于用户感兴趣的项目的通知。 联系人选择服务可以接收通知并生成用于向用户发送通知的用户界面。 生成的用户界面可以包括唯一的标识符,并且还可以使用户能够提交用户联系信息以请求与服务代理的联系。 联系人选择服务可以进一步预先授权用户和客户服务代理CSA之间的联系。 唯一标识符和可选地提交的用户联系信息可以由联系人选择服务使用以选择性地确定由联系人选择服务接收的哪些客户联系人请求被预先授权以与CSA联系,并且实现客户和CSA之间的这种联系 继续。
    • 90. 发明授权
    • Establishing secure remote access to private computer networks
    • 建立对私有计算机网络的安全远程访问
    • US08844020B2
    • 2014-09-23
    • US13481496
    • 2012-05-25
    • Andrew J. DoaneEric Jason Brandwine
    • Andrew J. DoaneEric Jason Brandwine
    • H04L29/06H04L29/08
    • H04L63/0272H04L61/2069H04L63/10H04L67/18H04L67/34H04L67/36
    • Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service to create and configure computer networks that are provided by the configurable network service for use by the users. Secure private access between a computer network provided for a user by the configurable network service and one or more other remote computing systems of the user (e.g., a remote private network) may be enabled in various ways. For example, a user may programmatically invoke an API provided by the configurable network service to obtain assistance in establishing remote access from a remote location to a provided computer network of the configurable network service, such as to establish a VPN connection from the remote location to the provided computer network using hardware and/or software supplied to the remote location in response to the API invocation.
    • 描述了用于向用户提供对计算机网络的访问的技术,例如使得用户能够与远程可配置网络服务交互以创建和配置由可配置网络服务提供以供用户使用的计算机网络。 通过可配置网络服务为用户提供的计算机网络与用户的一个或多个其他远程计算系统(例如,远程专用网络)之间的安全私人访问可以以各种方式启用。 例如,用户可以以编程方式调用可配置网络服务提供的API,以获得建立从远程位置到所提供的可配置网络服务的计算机网络的远程访问的帮助,例如建立从远程位置到 提供的计算机网络使用响应于API调用提供给远程位置的硬件和/或软件。