会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Detecting system abuse
    • 检测系统滥用
    • US07533414B1
    • 2009-05-12
    • US10803473
    • 2004-03-17
    • Erik J. ReedUdi Manber
    • Erik J. ReedUdi Manber
    • G06F11/00
    • H04L63/1458G06F21/552H04L63/1408
    • A system continually monitors service requests and detects service abuses. First, a screening list is created to identify potential abuse events. A screening list includes event IDs and associated count values. A pointer cyclically selects entries in the table, advancing as events are received. An incoming event ID is compared with the event IDs in the table. If the incoming event ID matches an event ID in the screening list, the associated count is incremented. Otherwise, the count of a selected table entry is decremented. If the count value of the selected entry falls to zero, it is replaced with the incoming event. Event IDs can be based on properties of service users, such as user identifications, or of service request contents, such as a search term or message content. The screening list is analyzed to determine whether actual abuse is occurring.
    • 系统持续监视服务请求并检测服务滥用。 首先,创建一个筛选列表来识别潜在的滥用事件。 筛选列表包括事件ID和关联的计数值。 指针循环地选择表中的条目,随着事件被接收而前进。 传入事件ID与表中的事件ID进行比较。 如果传入事件ID与筛选列表中的事件ID匹配,则相关联的计数将递增。 否则,递减所选表条目的计数。 如果所选条目的计数值为零,则将被传入事件替换。 事件ID可以基于服务用户的属性,例如用户标识或服务请求内容,例如搜索词或消息内容。 分析筛选表以确定是否发生实际滥用。