会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Retransmitting lost packets for multicast data distribution
    • 重新发送丢失的数据包,用于组播数据分发
    • US09083541B1
    • 2015-07-14
    • US12979725
    • 2010-12-28
    • Gregory P. OlsenAlan B. Butt
    • Gregory P. OlsenAlan B. Butt
    • H04L12/28H04L12/18H04L12/761
    • H04L12/185H04L12/1868H04L45/16
    • A computing device configured for retransmitting lost packets for multicast is described. It includes a processor and instructions in memory. It identifies data, which it begins sending via multicast. No data is resent until all the data has been sent. The computing device requests missed packet lists and waits. It adds missed packets to a map if there are replies. It determines whether there are any missed packets and resends any missed packets. Another computing device for retransmitting lost packets for multicast is described. It includes a processor and instructions in memory. It identifies data for distribution, which it begins sending via multicast. It waits to resend any data until all of the data has been sent. A missed packet indication is requested and received. The computing device updates lists of complete and incomplete target nodes. It determines and sends a peer download instruction.
    • 描述了配置为重传丢失的组播的丢包的计算设备。 它包括处理器和内存中的指令。 它识别通过组播开始发送的数据。 在发送所有数据之前,不会重新发送数据。 计算设备请求丢失的数据包列表和等待。 如果有答复,它会将错误的数据包添加到地图。 它确定是否存在丢失的数据包,并重新发送任何错过的数据包。 描述用于重传用于多播的丢失分组的另一计算设备。 它包括处理器和内存中的指令。 它识别分发的数据,它通过组播开始发送。 它等待重​​新发送任何数据,直到所有的数据都被发送。 请求并接收到错过的分组指示。 计算设备更新完整和不完整的目标节点的列表。 它确定并发送对等体下载指令。
    • 3. 发明授权
    • Systems and methods for managing requests for connections to services on a computer system
    • 用于管理与计算机系统上的服务的连接的请求的系统和方法
    • US08166177B1
    • 2012-04-24
    • US11553921
    • 2006-10-27
    • David A. EatoughAlan B. Butt
    • David A. EatoughAlan B. Butt
    • G06F15/16
    • H04L67/141H04L12/66H04L67/28
    • In an exemplary method, a resident agent receives multiple requests from one or more requesting processes for connections to services. The requested services are hosted by a fast service host. The resident agent establishes multiple connections to the one or more requesting processes for the requested services. The resident agent notifies a single instance of a fast service host of the multiple connections. The resident agent facilitates communication between the requested services on the fast service host and the one or more requesting processes. This may involve establishing one or more routing connections to the fast service host, and routing data between the one or more requesting processes and the requested services on the fast service host.
    • 在示例性方法中,驻留代理从用于连接到服务的一个或多个请求进程接收多个请求。 所请求的服务由快速服务主机托管。 驻留代理建立与所请求服务的一个或多个请求进程的多个连接。 驻留代理通知多个连接的快速服务主机的单个实例。 驻留代理促进快速服务主机上的所请求服务与一个或多个请求进程之间的通信。 这可能涉及到建立到快速业务主机的一个或多个路由连接,以及在一个或多个请求进程和快速服务主机上所请求的服务之间路由数据。
    • 5. 发明授权
    • Systems and methods employing intermittent scanning techniques to identify sensitive information in data
    • 采用间歇扫描技术识别数据中的敏感信息的系统和方法
    • US08608063B2
    • 2013-12-17
    • US13149544
    • 2011-05-31
    • Alan B. ButtNathan K. Stocks
    • Alan B. ButtNathan K. Stocks
    • G06K5/00G06F17/30
    • G06F17/30985G06Q20/4016
    • Potentially sensitive information (e.g., account numbers for payment cards, etc.) may be identified from data by use of an “interval scanning” technique, in which a string of data is evaluated in intervals. When a system employs an interval scanning technique, data is evaluated by analyzing bytes of data in periodic sequence (e.g., every thirteenth byte, etc.), while the bytes between the analyzed bytes are initially ignored. If the value of an analyzed byte corresponds to a character of interest (e.g., a decimal numeral or numeric digit (i.e., a character having a value that corresponds to a base-ten, or Arabic, number, 0, 1, 2, 3, 4, 5, 6, 7, 8, or 9), etc.), that byte is identified as a “base byte,” from which a more focused evaluation (e.g., a byte-by-byte analysis, or sequential analysis, etc.) may then commence.
    • 可以通过使用“间隔扫描”技术从数据中识别潜在敏感信息(例如,支付卡的帐号),其中以间隔来评估数据串。 当系统采用间隔扫描技术时,通过以周期性顺序(例如,每第13个字节等)分析数据字节来评估数据,而分析字节之间的字节最初被忽略。 如果分析的字节的值对应于感兴趣的字符(例如,十进制数字或数字数字(即,具有对应于十进制数的值的字符,或阿拉伯数字,数字,0,1,2,3 ,4,5,6,7,8或9)等),该字节被标识为“基本字节”,从其中可以进行更集中的评估(例如,逐字节分析或顺序分析 等)可以开始。
    • 6. 发明申请
    • SYSTEMS AND METHODS EMPLOYING INTERMITTENT SCANNING TECHNIQUES TO IDENTIFY SENSITIVE INFORMATION IN DATA
    • 采用间歇扫描技术识别数据中的敏感信息的系统和方法
    • US20120023117A1
    • 2012-01-26
    • US13149544
    • 2011-05-31
    • Alan B. ButtNathan K. Stocks
    • Alan B. ButtNathan K. Stocks
    • G06F7/00
    • G06F17/30985G06Q20/4016
    • Potentially sensitive information (e.g., account numbers for payment cards, etc.) may be identified from data by use of an “interval scanning” technique, in which a string of data is evaluated in intervals. When a system employs an interval scanning technique, data is evaluated by analyzing bytes of data in periodic sequence (e.g., every thirteenth byte, etc.), while the bytes between the analyzed bytes are initially ignored. If the value of an analyzed byte corresponds to a character of interest (e.g., a decimal numeral or numeric digit (i.e., a character having a value that corresponds to a base-ten, or Arabic, number, 0, 1, 2, 3, 4, 5, 6, 7, 8, or 9), etc.), that byte is identified as a “base byte,” from which a more focused evaluation (e.g., a byte-by-byte analysis, or sequential analysis, etc.) may then commence.
    • 可以通过使用“间隔扫描”技术从数据中识别潜在敏感信息(例如,支付卡的帐号),其中以间隔来评估数据串。 当系统采用间隔扫描技术时,通过以周期性顺序(例如,每第13个字节等)分析数据字节来评估数据,而分析字节之间的字节最初被忽略。 如果分析的字节的值对应于感兴趣的字符(例如,十进制数字或数字数字(即,具有对应于十进制数的值的字符,或阿拉伯数字,数字,0,1,2,3 ,4,5,6,7,8或9)等),该字节被标识为“基本字节”,从其中可以进行更集中的评估(例如,逐字节分析或顺序分析 等)可以开始。
    • 7. 发明授权
    • Systems and methods for managing a computer over a network
    • 通过网络管理计算机的系统和方法
    • US07827263B1
    • 2010-11-02
    • US11468584
    • 2006-08-30
    • Mark E. HowarthPeter E. JohnsonAlan B. ButtDavid A. Eatough
    • Mark E. HowarthPeter E. JohnsonAlan B. ButtDavid A. Eatough
    • G06F15/173
    • H04L41/046H04L67/2814H04L67/2819H04L67/327
    • A method for managing a computer over a network is disclosed. The method may be implemented by a resident agent on the network. A connection between the resident agent and a sending application may be opened. Application data may be received from the sending application by the resident agent. A header may be received from the sending application by the resident agent. Whether a data package should be sent directly to a receiving application or whether the data package should be sent through a gateway may be determined. If it is determined that the data package should be sent directly to a receiving application, the data package may be sent directly to the receiving application. If it is determined that the data package should be sent through the gateway, the data package may be sent through the gateway.
    • 公开了一种通过网络管理计算机的方法。 该方法可以由网络上的驻留代理来实现。 可以打开驻留代理和发送应用程序之间的连接。 应用数据可以由驻地代理从发送应用接收。 可以由驻地代理从发送应用接收报头。 数据包是否应该直接发送到接收应用程序,还是数据包是否应通过网关发送。 如果确定数据包应该直接发送到接收应用,则数据包可以被直接发送到接收应用。 如果确定要通过网关发送数据包,则可以通过网关发送数据包。
    • 8. 发明授权
    • Systems and methods for verifying the trustworthiness of a file comprising computer instructions
    • 用于验证包含计算机指令的文件的可信赖性的系统和方法
    • US07565544B1
    • 2009-07-21
    • US11098719
    • 2005-04-04
    • David A. EatoughAlan B. Butt
    • David A. EatoughAlan B. Butt
    • G06F9/00
    • G06F21/51
    • An exemplary method involves receiving a request to process a file comprising computer instructions. The file may be a script, a source code file, a binary file, etc. The method also involves identifying a digital signature embedded in comments within the file. The method also involves attempting to validate the digital signature. If the digital signature is validated, the file is processed. If the digital signature is not validated, the file is not processed. The file may include multiple digital signatures. When this occurs, the file may be processed only if all of the multiple digital signatures are validated. Alternatively, the file may be processed if any of the multiple digital signatures are validated.
    • 一种示例性方法涉及接收处理包括计算机指令的文件的请求。 该文件可以是脚本,源代码文件,二进制文件等。该方法还涉及识别在文件中的注释中嵌入的数字签名。 该方法还涉及尝试验证数字签名。 如果数字签名被验证,则处理该文件。 如果数字签名未经验证,则不会处理该文件。 该文件可以包括多个数字签名。 当发生这种情况时,只有当所有多个数字签名都被验证时,才能处理该文件。 或者,如果多个数字签名中的任一个被验证,则可以处理该文件。
    • 10. 发明授权
    • Systems and methods employing delimiter searches to identify sensitive information in data
    • 使用定界符搜索的系统和方法来识别数据中的敏感信息
    • US08616443B2
    • 2013-12-31
    • US13149566
    • 2011-05-31
    • Alan B. ButtNathan K. Stocks
    • Alan B. ButtNathan K. Stocks
    • G06K5/00G06F17/30
    • G06F17/30985G06Q20/4016
    • A data string that includes potentially sensitive information, such as an account number for a payment card, may be evaluated using a delimiter search to provide an increased level of confidence that the data string encodes the sensitive information of interest. A delimiter search may include an evaluation of the bytes adjacent to the beginning and end of the data to determine whether or not those bytes have values that correspond to the values of known delimiters. A data string that is not surrounded by known delimiters may be disregarded (i.e., considered not to comprise sensitive information of interest), while a data string that is surrounded by known delimiters may warrant further evaluation.
    • 可以使用定界符搜索来评估包括潜在敏感信息(例如支付卡的帐号)的数据串,以提供数据串对感兴趣的敏感信息进行编码的增强的置信度。 定界符搜索可以包括与数据的开始和结束相邻的字节的评估,以确定这些字节是否具有与已知分隔符的值相对应的值。 未被已知分隔符包围的数据串可能被忽略(即,被认为不包括感兴趣的敏感信息),而被已知分隔符包围的数据串可能需要进一步评估。