会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Identifying executable scenarios in response to search queries
    • 识别响应搜索查询的可执行方案
    • US08078604B2
    • 2011-12-13
    • US11688037
    • 2007-03-19
    • Thekkthalackal Varugis KurienSteven E. JacksonScott A. FieldPhilip J. Lafornara
    • Thekkthalackal Varugis KurienSteven E. JacksonScott A. FieldPhilip J. Lafornara
    • G06F17/30
    • G06F17/3089Y10S707/99932
    • Systems, methods, and computer-readable media for identifying executable scenario solutions relevant to a user query and returning such executable scenario solutions as search results in response to the user query are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a series of steps which may be implemented to address a particular issue relevant to the received user query. Often, a series of steps or scenario includes a number of sub-scenarios, each of which is to be executed sequentially to achieve the desired result. Accordingly, upon selection of a particular search result, the user may be guided through a series of sub-scenario result options until an item having direct association to a series of steps is selected. Once selected, the executable scenario solution is presented to the user for execution.
    • 提供了用于识别与用户查询相关的可执行场景解决方案的系统,方法和计算机可读介质,并且响应于用户查询返回这些可执行场景解决方案作为搜索结果。 在接收到用户查询时,返回多个结果,每个结果代表可以被实现以处理与所接收的用户查询相关的特定问题的一系列步骤。 通常,一系列步骤或场景包括若干子场景,每个子场景将被顺序执行以实现期望的结果。 因此,在选择特定的搜索结果之后,可以引导用户通过一系列子场景结果选项直到选择与一系列步骤有直接关联的项目。 一旦选择,可执行的场景解决方案被呈现给用户执行。
    • 9. 发明申请
    • IDENTIFYING EXECUTABLE SCENARIOS IN RESPONSE TO SEARCH QUERIES
    • 在搜索问题的响应中识别可执行场景
    • US20080235179A1
    • 2008-09-25
    • US11688037
    • 2007-03-19
    • Thekkthalackal Varugis KurienSteven E. JacksonScott A. FieldPhilip J. Lafornara
    • Thekkthalackal Varugis KurienSteven E. JacksonScott A. FieldPhilip J. Lafornara
    • G06F17/30
    • G06F17/3089Y10S707/99932
    • Systems, methods, and computer-readable media for identifying executable scenario solutions relevant to a user query and returning such executable scenario solutions as search results in response to the user query are provided. Upon receiving a user query, a plurality of results is returned, each result being representative of a series of steps which may be implemented to address a particular issue relevant to the received user query. Often, a series of steps or scenario includes a number of sub-scenarios, each of which is to be executed sequentially to achieve the desired result. Accordingly, upon selection of a particular search result, the user may be guided through a series of sub-scenario result options until an item having direct association to a series of steps is selected. Once selected, the executable scenario solution is presented to the user for execution.
    • 提供了用于识别与用户查询相关的可执行场景解决方案的系统,方法和计算机可读介质,并且响应于用户查询返回这些可执行场景解决方案作为搜索结果。 在接收到用户查询时,返回多个结果,每个结果代表可以被实现以处理与所接收的用户查询相关的特定问题的一系列步骤。 通常,一系列步骤或场景包括若干子场景,每个子场景将被顺序执行以实现期望的结果。 因此,在选择特定的搜索结果之后,可以引导用户通过一系列子场景结果选项直到选择与一系列步骤有直接关联的项目。 一旦选择,可执行的场景解决方案被呈现给用户执行。
    • 10. 发明授权
    • Import address table verification
    • 导入地址表验证
    • US07739516B2
    • 2010-06-15
    • US10794292
    • 2004-03-05
    • Scott A. BrenderPhilip J. LafornaraMichael David MarrRobert Ian Oliver
    • Scott A. BrenderPhilip J. LafornaraMichael David MarrRobert Ian Oliver
    • G06F11/30G06F12/14
    • G06F12/1416G06F21/51
    • The import address table of a software module is verified in order to prevent detouring attacks. A determination is made regarding which entries in the IAT must be verified; all of the entries may be verified or some subset of the entries that are critical may be verified. For each external function, the external module containing the external function is loaded, if it is not already loaded. The function address in the exported function table is found. That address is compared to the address for the function in the IAT. Additionally, the external module, in one embodiment, is verified to ensure that it has not been modified. For a delay load IAT, a similar procedure is followed; however the delay load IAT may be periodically checked to ensure that the delay load IAT entries are either valid (indicating that the external function has been bound) or in their initial state (indicating that no binding has yet occurred).
    • 验证软件模块的导入地址表,以防止迂回攻击。 确定必须验证IAT中的哪些条目; 可以验证所有条目,或者可以验证关键的条目的某些子集。 对于每个外部功能,如果外部模块尚未加载,则会加载包含外部功能的外部模块。 找到导出的功能表中的功能地址。 该地址与IAT中功能的地址进行比较。 此外,在一个实施例中,外部模块被验证以确保其未被修改。 对于延迟负载IAT,遵循类似的过程; 然而,可以定期检查延迟负载IAT以确保延迟负载IAT条目是有效的(指示外部功能已经被绑定)或处于其初始状态(指示还没有发生绑定)。