会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明申请
    • EYE MOVEMENT BASED KNOWLEDGE DEMONSTRATION
    • 基于眼睛运动的知识演示
    • US20140331315A1
    • 2014-11-06
    • US13995937
    • 2011-12-23
    • Eran BirkShai KavasMichael JacobOmer Ben-Shalom
    • Eran BirkShai KavasMichael JacobOmer Ben-Shalom
    • G06F21/32G06F21/36
    • G06F21/32G06F21/36G06K9/00604G06K9/00617
    • Embodiments of methods, apparatuses, and storage mediums associated with eye movement based knowledge demonstration, having a particular application to authentication, are disclosed. In embodiments, a computing device may determine whether a received input of a pattern of eye movements is consistent with an expected pattern of eye movements of a user when the user attempts to visually locate a piece of information embedded in a display. In embodiments, the expected pattern of eye movements may include patterns related to fixations and/or other statistical patterns, however, may not be limited to such patterns. In applications, determining consistency or correlation with the expected pattern of eye movements may identify the user by simultaneously verifying at least factors of authentication—that of biometric criteria related to a user's pattern of eye movements and a password or other information known to the user.
    • 公开了具有特定应用于认证的基于眼动的知识演示相关联的方法,设备和存储介质的实施例。 在实施例中,当用户尝试在视觉上定位嵌入在显示器中的一条信息时,计算设备可以确定眼睛运动模式的接收输入是否与用户的眼睛运动的预期模式一致。 在实施例中,眼睛运动的期望模式可以包括与固定和/或其他统计模式相关的模式,然而,可以不限于这种模式。 在应用中,确定与眼睛运动的预期模式的一致性或相关性可以通过同时验证至少认证因素 - 与用户的眼睛运动模式相关的生物测定标准,以及用户已知的密码或其他信息来识别用户。
    • 10. 发明申请
    • NETWORK PROTECTION VIA EMBEDDED CONTROLS
    • 网络保护通过嵌入式控制
    • US20100218252A1
    • 2010-08-26
    • US12773815
    • 2010-05-04
    • Omer Ben-ShalomAdi Shaliv
    • Omer Ben-ShalomAdi Shaliv
    • G06F21/00H04L12/56
    • H04L41/5022H04L41/0213H04L43/00H04L43/0811H04L43/16H04L63/1416
    • The present disclosure provides a method for providing network protection. A method according to one embodiment may include detecting an infected data packet at an in-line device. The method may further include receiving a first instruction from the in-line device at a central management server, the instruction identifying the origin of the infected data packet. The method may also include receiving a marking instruction from the central management server at an infected endpoint device and marking outgoing data packets at the infected endpoint device to create marked data packets. Of course, many alternatives, variations and modifications are possible without departing from this embodiment.
    • 本公开提供了一种用于提供网络保护的方法。 根据一个实施例的方法可以包括检测在线设备处的被感染的数据分组。 该方法还可以包括在中央管理服务器处从在线设备接收第一指令,该指令标识被感染数据分组的来源。 该方法还可以包括在受感染的端点设备处接收来自中央管理服务器的标记指令,并且在感染的端点设备处标记输出数据分组以创建标记的数据分组。 当然,在不脱离本实施例的情况下,可以进行许多替代,变化和修改。