会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Noise reduction based on mouth area movement recognition
    • 基于口腔运动识别的降噪
    • US09263044B1
    • 2016-02-16
    • US13534388
    • 2012-06-27
    • Ryan H. CassidyYuzo WatanabeIsaac S. Noble
    • Ryan H. CassidyYuzo WatanabeIsaac S. Noble
    • G10L15/24G10L15/25
    • G10L15/24G06K9/00281G06K9/00315G06K9/6201G10L15/25G10L21/0208
    • A computing device can capture video data of at least a portion of a mouth area (e.g., mouth, lips, tongue, chin, jaw) of a user of the device. The computing device can also capture sound data including a voice of the user as well as noise (e.g. background noise). The video data can be processed to detect a movement of the portion of the mouth area. The movement of the portion of the mouth area can be analyzed and compared with mouth area movement models characteristic of oral communication (e.g., speech, song). If the movement of the portion of the mouth area corresponds to at least one model characteristic of oral communication, then the movement indicates that the user is likely engaging in oral communication. Noise reduction can be applied and/or increased on the captured sound data to reduce noise and in turn enhance the user's voice.
    • 计算设备可以捕获设备的用户的口部区域(例如,嘴,嘴唇,舌头,下巴,颌部)的至少一部分的视频数据。 计算设备还可以捕获包括用户的语音以及噪声(例如背景噪声)的声音数据。 可以处理视频数据以检测口部区域的移动。 可以分析嘴部区域的运动并与口腔通信(例如,语音,歌曲)特征的口区运动模型进行比较。 如果嘴部区域的运动对应于至少一种口腔通信的模型特征,则运动指示用户很可能进行口头交流。 可以在捕获的声音数据上施加和/或增加噪声降低噪声,从而增强用户的声音。
    • 3. 发明授权
    • Method and apparatus for limiting denial of service attack by limiting traffic for hosts
    • 通过限制主机流量来限制拒绝服务攻击的方法和装置
    • US08312544B2
    • 2012-11-13
    • US12611467
    • 2009-11-03
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • G06F9/00G06F11/00
    • H04L63/1416H04L63/1458
    • A method for controlling a denial of service attack involves receiving a plurality of packets from a network, identifying an attacking host based on a severity level of the denial of service attack from the network, wherein the attacking host is identified by an identifying attack characteristic associated with one of the plurality of packets associated with the attacking host, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets associated with the identifying attack characteristic to one of the plurality of temporary data structures matching the severity level of the denial of service attack as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures matching the severity level by the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
    • 用于控制拒绝服务攻击的方法包括从网络接收多个分组,基于来自网络的拒绝服务攻击的严重性级别识别攻击主机,其中攻击主机通过相关联的识别攻击特征来识别 与所述攻击主机相关联的所述多个分组中的一个分组,通过分类器分析所述多个分组中的每一个,以确定所述多个分组中的每一个被转发到多个临时数据结构中的哪一个,转发所述多个分组中的每个分组 与所述多个临时数据结构中的一个临时数据结构中的一个临时数据结构相关联,所述临时数据结构与由所述分类器确定的所述拒绝服务攻击的严重性级别匹配,请求从所述多个临时数据结构中的一个临时数据结构匹配严重性级别 通过虚拟序列化队列,并将数据包的数量转发到virtua l序列化队列
    • 10. 发明授权
    • Method and apparatus for dynamically isolating affected services under denial of service attack
    • 在拒绝服务攻击下动态隔离受影响的服务的方法和装置
    • US07739736B1
    • 2010-06-15
    • US11112158
    • 2005-04-22
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • Sunay TripathiNicolas G. DrouxYuzo Watanabe
    • G06F9/00G06F11/00H04L29/06
    • H04L63/1458
    • A method for controlling consumption of resources by a packet destination involves receiving a plurality of packets from a network, identifying the packet destination consuming greater than a pre-determined amount of resources to process the plurality of packets, analyzing each of the plurality of packets by a classifier to determine to which of a plurality of temporary data structures each of the plurality of packet is forwarded, forwarding each of the plurality of packets to one of the plurality of temporary data structures as determined by the classifier, requesting a number of packets from the one of the plurality of temporary data structures associated with the packet destination by the virtual serialization queue, wherein the number of packets is limited by an attack control parameter associated with the virtual serialization queue, and forwarding the number of packets to the virtual serialization queue.
    • 用于控制分组目的地的资源消耗的方法包括从网络接收多个分组,识别分组目的地消耗大于预定量的资源以处理多个分组,通过以下方式分析多个分组中的每一个: 分类器,用于确定多个分组中的每一个被转发到多个临时数据结构中的哪一个,将所述多个分组中的每一个转发到由所述分类器确定的所述多个临时数据结构中的一个,请求数量的分组 所述虚拟序列化队列与所述分组目的地相关联的所述多个临时数据结构中的所述多个临时数据结构中的一个,其中所述分组的数量受与所述虚拟序列化队列相关联的攻击控制参数的限制,并且将所述分组的数目转发到所述虚拟序列化队列 。