会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system for obscuring user access patterns using a buffer memory
    • 使用缓冲存储器模糊用户访问模式的方法和系统
    • US07277961B1
    • 2007-10-02
    • US09703213
    • 2000-10-31
    • Jonathan M. SmithSalvatore J. StolfoJeffrey C. SherwinJeffrey D. ChungAndreas L. Prodromidis
    • Jonathan M. SmithSalvatore J. StolfoJeffrey C. SherwinJeffrey D. ChungAndreas L. Prodromidis
    • G06F15/173
    • G06Q20/20G06F21/6245H04L63/0407
    • A method and system for obscuring user requests for information in a computer network. A user request for information, aimed at another network member, is routed to a first cache memory. If the first cache memory contains the requested information, the cache returns the requested information in response to the user request without releasing the user request to the network member. If the first cache memory does not contain the requested information, a first reference editing function edits user identity information contained in the request, resulting in an edited request with obscured identity information. The edited request is then released to the network member and the requested information is received by the user from the network member. A copy of the requested information is stored in the first cache memory. In this method and system, user privacy is enhanced because user requests for information that can be satisfied by information stored in the cache memory are not revealed to other network members, and user requests that cannot be satisfied by the cache memory are obscured by the reference editing function prior to release to other network members. A software program and system for implementing the method are also disclosed.
    • 一种用于遮蔽用户在计算机网络中的信息请求的方法和系统。 针对另一网络成员的用户对信息的请求被路由到第一高速缓冲存储器。 如果第一高速缓存存储器包含所请求的信息,则高速缓存响应于用户请求返回所请求的信息,而不向网络成员释放用户请求。 如果第一高速缓冲存储器不包含所请求的信息,则第一参考编辑功能编辑包含在请求中的用户身份信息,导致编辑的请求具有隐蔽的身份信息。 所编辑的请求然后被释放到网络成员,并且所请求的信息被用户从网络成员接收。 所请求信息的副本存储在第一高速缓冲存储器中。 在该方法和系统中,增强了用户隐私,因为用户对存储在高速缓冲存储器中的信息可以满足的信息请求不会被其他网络成员泄露,并且高速缓冲存储器不能满足的用户请求被参考 编辑功能之前发布给其他网络成员。 还公开了一种用于实现该方法的软件程序和系统。
    • 4. 发明授权
    • Location independent files
    • 位置独立文件
    • US09195666B2
    • 2015-11-24
    • US13351987
    • 2012-01-17
    • Deric S. HornJeffrey D. ChungWenguang Wang
    • Deric S. HornJeffrey D. ChungWenguang Wang
    • G06F17/30
    • G06F17/30073G06F17/30174G06F17/30194
    • Managing data units by converting the data units into data segments and access files describing how to retrieve the data segments using hash values for the data segments. In a data store operation, the data unit is divided into data segments and an access file is generated. The access file includes segmenting scheme information for the data segments, hashing scheme information for the hash values, hash identification information describing the hash values, and location information identifying the locations at which the data segments are available. In a data retrieval operation, data from the data unit is retrieved by accessing the data segments and extracting the data therefrom, where the data segments are retrieved based on the access file for the data unit.
    • 通过将数据单元转换为数据段并访问描述如何使用数据段的哈希值检索数据段的文件来管理数据单元。 在数据存储操作中,将数据单元划分成数据段,生成访问文件。 访问文件包括用于数据段的分段方案信息,散列值的散列方案信息,描述哈希值的散列识别信息,以及标识数据段可用位置的位置信息。 在数据检索操作中,通过访问数据段并从其中提取数据来检索来自数据单元的数据,其中基于数据单元的访问文件检索数据段。
    • 5. 发明授权
    • Method and system for monitoring integrity of running computer system
    • 监控运行计算机系统完整性的方法和系统
    • US08732824B2
    • 2014-05-20
    • US11656453
    • 2007-01-23
    • William A. ArbaughJeffrey D. ChungNick L. PetroniBryan Boot
    • William A. ArbaughJeffrey D. ChungNick L. PetroniBryan Boot
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • G06F21/57
    • Monitoring integrity of a running computer system is based on creating a Test Model which includes predicates descriptive of invariant properties of security relevant objects and their attributes in the monitored structure known-to-be “healthy”, acquiring memory image of a portion of the running monitored structure, decomposing the acquired memory image to retrieve representation of the security relevant objects of interest, by implementing the attributes of the Test Model, and verifying, by implementing the predicates, whether the invariant properties defined in the Test Model remain unchanged for the running host system. If a discrepancy is detected, a signal indicative of a detected discrepancy is transmitted to a management entity for analysis and formulating a course of action.
    • 监视正在运行的计算机系统的完整性是基于创建一个测试模型,该测试模型包括描述安全相关对象的不变属性的谓词,以及在被称为“健康”的已监测结构中的属性,获取运行的一部分的内存映像 监测结构,通过实施测试模型的属性来分解所获取的存储器图像以检索安全相关对象的表示,并且通过实现测试模型来验证测试模型中定义的不变性质是否保持不变 主机系统。 如果检测到差异,则指示检测到的差异的信号被发送到管理实体以进行分析和制定行动过程。
    • 6. 发明申请
    • LOCATION INDEPENDENT FILES
    • 位置独立文件
    • US20130185266A1
    • 2013-07-18
    • US13351987
    • 2012-01-17
    • Deric S. HornJeffrey D. ChungWenguang Wang
    • Deric S. HornJeffrey D. ChungWenguang Wang
    • G06F17/30G06F7/00
    • G06F17/30073G06F17/30174G06F17/30194
    • Managing data units by converting the data units into data segments and access files describing how to retrieve the data segments using hash values for the data segments. In a data store operation, the data unit is divided into data segments and an access file is generated. The access file includes segmenting scheme information for the data segments, hashing scheme information for the hash values, hash identification information describing the hash values, and location information identifying the locations at which the data segments are available. In a data retrieval operation, data from the data unit is retrieved by accessing the data segments and extracting the data therefrom, where the data segments are retrieved based on the access file for the data unit.
    • 通过将数据单元转换为数据段并访问描述如何使用数据段的哈希值检索数据段的文件来管理数据单元。 在数据存储操作中,将数据单元划分成数据段,生成访问文件。 访问文件包括用于数据段的分段方案信息,散列值的散列方案信息,描述哈希值的散列识别信息,以及标识数据段可用位置的位置信息。 在数据检索操作中,通过访问数据段并从其中提取数据来检索来自数据单元的数据,其中基于数据单元的访问文件检索数据段。