会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Modeling user access to computer resources
    • 建模用户对计算机资源的访问
    • US08214364B2
    • 2012-07-03
    • US12124274
    • 2008-05-21
    • Joseph P. BigusLeon GongChristoph Lingenfelder
    • Joseph P. BigusLeon GongChristoph Lingenfelder
    • G06F17/30
    • G06F21/552G06F21/316
    • Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes.
    • 本发明的实施例提供了一种用于检测计算机资源的授权用户的行为变化并将检测到的变化报告给相关个人的方法。 该方法包括评估每个用户针对用户行为模型和业务规则执行的动作。 作为分析的结果,可以识别和报告用户的一部分具有不寻常或可疑行为。 作为回应,管理层可以提供反馈意见,指出用户行为是由于正常的预期业务需求或行为值得进一步审查。 管理反馈可供机器学习算法使用,以改善用户随时间的行为分析。 因此,相对于现有技术方法,对于计算机资源的用户行为的调查被有助于更有效地防止数据丢失,而对正在进行的业务流程的中断只是最小的。
    • 6. 发明申请
    • MODELING USER ACCESS TO COMPUTER RESOURCES
    • 建模用户访问计算机资源
    • US20090292743A1
    • 2009-11-26
    • US12124274
    • 2008-05-21
    • Joseph P. BigusLeon GongChristoph Lingenfelder
    • Joseph P. BigusLeon GongChristoph Lingenfelder
    • G06F12/00
    • G06F21/552G06F21/316
    • Embodiments of the invention provide a method for detecting changes in behavior of authorized users of computer resources and reporting the detected changes to the relevant individuals. The method includes evaluating actions performed by each user against user behavioral models and business rules. As a result of the analysis, a subset of users may be identified and reported as having unusual or suspicious behavior. In response, the management may provide feedback indicating that the user behavior is due to the normal expected business needs or that the behavior warrants further review. The management feedback is available for use by machine learning algorithms to improve the analysis of user actions over time. Consequently, investigation of user actions regarding computer resources is facilitated and data loss is prevented more efficiently relative to the prior art approaches with only minimal disruption to the ongoing business processes.
    • 本发明的实施例提供了一种用于检测计算机资源的授权用户的行为变化并将检测到的变化报告给相关个人的方法。 该方法包括评估每个用户针对用户行为模型和业务规则执行的动作。 作为分析的结果,可以识别和报告用户的一部分具有不寻常或可疑行为。 作为回应,管理层可以提供反馈意见,指出用户行为是由于正常的预期业务需求或行为值得进一步审查。 管理反馈可供机器学习算法使用,以改善用户随时间的行为分析。 因此,相对于现有技术方法,对于计算机资源的用户行为的调查被有助于更有效地防止数据丢失,而对正在进行的业务流程的中断只是最小的。
    • 10. 发明授权
    • Adaptive job scheduling using neural network priority functions
    • 使用神经网络优先级函数的自适应作业调度
    • US5442730A
    • 1995-08-15
    • US134764
    • 1993-10-08
    • Joseph P. Bigus
    • Joseph P. Bigus
    • G06G7/60G06F9/46G06F9/48G06F9/50G06F15/18
    • G06F9/4881
    • A job scheduler makes decisions concerning the order and frequency of access to a resource according to a substantially optimum delay cost function. The delay cost function is a single value function of one or more inputs, where at least one of the inputs is a delay time which increases as a job waits for service. The job scheduler is preferably used by a multi-user computer operating system to schedule jobs of different classes. The delay cost functions are preferably implemented by neural networks. The user specifies desired performance objectives for each job class. The computer system runs for a specified period of time, collecting data on system performance. The differences between the actual and desired performance objectives are computed, and used to adaptively train the neural network. The process repeats until the delay cost functions stabilize near optimum value. However, if the system configuration, workload, or desired performance objectives change, the neural network will again start to adapt.
    • 作业调度器根据基本上最佳的延迟成本函数做出关于资源访问顺序和频率的决定。 延迟成本函数是一个或多个输入的单值函数,其中至少一个输入是随着作业等待服务而增加的延迟时间。 作业调度程序优选地由多用户计算机操作系统使用以调度不同类别的作业。 延迟成本函数优选地由神经网络实现。 用户为每个作业类别指定所需的性能目标。 计算机系统运行指定的时间段,收集有关系统性能的数据。 计算实际和期望性能目标之间的差异,并用于自适应训练神经网络。 该过程重复,直到延迟成本函数稳定在最佳值附近。 然而,如果系统配置,工作负载或期望的性能目标改变,神经网络将再次开始适应。