TRANSITION DETECTOR
    22.
    发明申请
    TRANSITION DETECTOR 有权
    过渡检测器

    公开(公告)号:US20130003905A1

    公开(公告)日:2013-01-03

    申请号:US13174574

    申请日:2011-06-30

    CPC classification number: H03K5/1534 H03K19/00346

    Abstract: An embodiment of a detector includes first and second generators. The first generator is operable to receive a transition of a first signal and to generate in response to the transition a first pulse having a length that is approximately equal to a length of a detection window. And the second generator is operable to receive a second signal and to generate a second pulse having a relationship to the first pulse in response to a transition of the second signal occurring approximately during the detection window.

    Abstract translation: 检测器的实施例包括第一和第二发生器。 第一发生器可操作以接收第一信号的转换并且响应于转换而产生具有近似等于检测窗口的长度的长度的第一脉冲。 并且第二发生器可操作以响应于在检测窗口期间大致发生的第二信号的转变而接收第二信号并产生与第一脉冲具有关系的第二脉冲。

    System and method for voice authentication over a computer network
    23.
    发明授权
    System and method for voice authentication over a computer network 有权
    通过计算机网络进行语音认证的系统和方法

    公开(公告)号:US08095368B2

    公开(公告)日:2012-01-10

    申请号:US12328365

    申请日:2008-12-04

    Applicant: Saurabh Kumar

    Inventor: Saurabh Kumar

    Abstract: Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, performing a comparison of the received speech sample to a previously established speech profile associated with the user, transmitting an authentication to the network client if the comparison is equal to or greater than a certainty threshold, and transmitting a denial to the network client if the comparison is less than the certainty threshold.

    Abstract translation: 提供系统,计算机实现的方法和有形的计算机可读介质用于语音认证。 该方法包括通过因特网浏览器通过互联网浏览器接收来自用户的语音样本,作为对受限访问资源的请求的一部分,执行将接收到的语音样本与先前建立的与用户相关联的语音简档的比较,发送认证 如果比较等于或大于确定性阈值,则向网络客户端发送拒绝,如果比较小于确定阈值,则向网络客户端发送拒绝。

    Automatic generation of embedded signatures for duplicate detection on a public network
    24.
    发明授权
    Automatic generation of embedded signatures for duplicate detection on a public network 有权
    自动生成嵌入式签名,用于公共网络上的重复检测

    公开(公告)号:US07979413B2

    公开(公告)日:2011-07-12

    申请号:US12156370

    申请日:2008-05-30

    CPC classification number: G06F17/30663 G06F21/552

    Abstract: In accordance with an aspect of the invention, a method and system are disclosed for constructing an embedded signature in order to facilitate post-facto detection of leakage of sensitive data. The leakage detection mechanism involves: 1) identifying at least one set of words in an electronic document containing sensitive data, the set of words having a low frequency of occurrence in a first collection of electronic documents; and, 2) transmitting a query to search a second collection of electronic documents for any electronic document that contains the set of words having a low frequency of occurrence. This leakage detection mechanism has at least the following advantages: a) it is tamper-resistant; b) it avoids the need to add a watermark to the sensitive data, c) it can be used to locate the sensitive data even if the leakage occurred before the embedded signature was ever identified; and, d) it can be used to detect an embedded signature regardless of whether the data is being presented statically or dynamically.

    Abstract translation: 根据本发明的一个方面,公开了一种用于构建嵌入式签名的方法和系统,以便于事后检测敏感数据的泄漏。 所述泄漏检测机构包括:1)识别包含敏感数据的电子文档中的至少一组单词,所述一组单词在电子文档的第一集合中具有低频率出现; 以及2)发送查询以搜索包含具有低发生频率的单词集合的任何电子文档的第二电子文档集合。 该泄漏检测机构至少具有以下优点:a)它是防篡改的; b)它避免了需要向敏感数据添加水印,c)即使在嵌入式签名被识别之前发生泄漏,它也可以用于定位敏感数据; 以及d)它可以用于检测嵌入的签名,而不管数据是静态还是动态呈现。

    EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL
    25.
    发明申请
    EMPLOYING PHYSICAL LOCATION GEO-SPATIAL CO-ORDINATE OF COMMUNICATION DEVICE AS PART OF INTERNET PROTOCOL 有权
    使用物理位置通信设备的地理空间协调作为互联网协议的一部分

    公开(公告)号:US20110032870A1

    公开(公告)日:2011-02-10

    申请号:US12538407

    申请日:2009-08-10

    Applicant: Saurabh Kumar

    Inventor: Saurabh Kumar

    Abstract: System(s), method(s), and device(s) that incorporate a current physical location value associated with a communication device as part of internet protocol (IP) are presented. An IP management component obtains current physical location information of a wireless communication device and modifies the IP address to incorporate the current physical location value corresponding to the current physical location of the communication device as part of the IP address of the communication device to prevent undesired intrusions by hackers, as communications associated with the communication device are routed to/from the communication device that is at the current physical location. If the communication device moves to a new location, the IP management component can perform a new IP address modification to modify the IP address to incorporate a new physical location value associated with the communication device.

    Abstract translation: 呈现了作为互联网协议(IP)的一部分并入与通信设备相关联的当前物理位置值的系统,方法和设备。 IP管理组件获取无线通信设备的当前物理位置信息,并且修改IP地址以将与通信设备的当前物理位置相对应的当前物理位置值作为通信设备的IP地址的一部分来结合,以防止不期望的入侵 由于与通信设备相关联的通信被路由到来自当前物理位置的通信设备。 如果通信设备移动到新位置,则IP管理组件可以执行新的IP地址修改以修改IP地址以并入与通信设备相关联的新的物理位置值。

    System for repeated unmount attempts of distributed file systems
    26.
    发明授权
    System for repeated unmount attempts of distributed file systems 失效
    分布式文件系统重复卸载尝试的系统

    公开(公告)号:US07886187B2

    公开(公告)日:2011-02-08

    申请号:US12124353

    申请日:2008-05-21

    CPC classification number: G06F11/0727 G06F11/0757 G06F11/1402

    Abstract: The present invention provides a computer implemented method and apparatus for unmounting file systems from a plurality of file servers. The method comprises of issuing an unmount command targeting a file system of a first server among the plurality of file servers. The timeout period is then expired without receiving an unmount acknowledgement associated with the unmount command. Thus, the timeout period is associated with an allowable time for the file system to acknowledge unmounting. In response to expiring the timeout period, a ping is transmitted to the first server among the plurality of file servers. The ping timeout then expires based on a failure to receive a ping acknowledgment corresponding to the ping. This action marks the first server for a later retry of unmounting to form a marked set based on the first server.

    Abstract translation: 本发明提供一种用于从多个文件服务器卸载文件系统的计算机实现的方法和装置。 该方法包括:在多个文件服务器之间发布针对第一服务器的文件系统的卸载命令。 超时期限然后过期,而不接收与卸载命令关联的卸载确认。 因此,超时时间与文件系统确认卸载的允许时间相关联。 响应于超时时间到期,在多个文件服务器中向第一服务器发送ping。 ping超时然后根据ping失败接收到ping确认失败。 此操作标记第一个服务器,以便稍后重试卸载,以形成基于第一个服务器的标记集。

    SYSTEM FOR REPEATED UNMOUNT ATTEMPTS OF DISTRIBUTED FILE SYSTEMS
    27.
    发明申请
    SYSTEM FOR REPEATED UNMOUNT ATTEMPTS OF DISTRIBUTED FILE SYSTEMS 失效
    分布式文件系统的重复审核系统

    公开(公告)号:US20090292957A1

    公开(公告)日:2009-11-26

    申请号:US12124353

    申请日:2008-05-21

    CPC classification number: G06F11/0727 G06F11/0757 G06F11/1402

    Abstract: The present invention provides a computer implemented method and apparatus for unmounting file systems from a plurality of file servers. The method comprises of issuing an unmount command targeting a file system of a first server among the plurality of file servers. The timeout period is then expired without receiving an unmount acknowledgement associated with the unmount command. Thus, the timeout period is associated with an allowable time for the file system to acknowledge unmounting. In response to expiring the timeout period, a ping is transmitted to the first server among the plurality of file servers. The ping timeout then expires based on a failure to receive a ping acknowledgment corresponding to the ping. This action marks the first server for a later retry of unmounting to form a marked set based on the first server.

    Abstract translation: 本发明提供一种用于从多个文件服务器卸载文件系统的计算机实现的方法和装置。 该方法包括:在多个文件服务器之间发布针对第一服务器的文件系统的卸载命令。 超时期限然后过期,而不接收与卸载命令关联的卸载确认。 因此,超时时间与文件系统确认卸载的允许时间相关联。 响应于超时时间到期,在多个文件服务器中向第一服务器发送ping。 ping超时然后根据ping失败接收到ping确认失败。 此操作标记第一个服务器,以便稍后重试卸载,以形成基于第一个服务器的标记集。

    System and method for voice authentication over a computer network
    29.
    发明授权
    System and method for voice authentication over a computer network 有权
    通过计算机网络进行语音认证的系统和方法

    公开(公告)号:US08886544B2

    公开(公告)日:2014-11-11

    申请号:US13311521

    申请日:2011-12-05

    Applicant: Saurabh Kumar

    Inventor: Saurabh Kumar

    Abstract: Systems, computer-implemented methods, and tangible computer-readable media are provided for voice authentication. The method includes receiving a speech sample from a user through an Internet browser for authentication as part of a request for a restricted-access resource, transmitting an authentication request to an authentication server, which compares the speech sample to a previously established speech profile associated with the user, receiving a response from the authentication server, and providing access to the restricted access resource based on the response.

    Abstract translation: 系统,计算机实现的方法和有形的计算机可读介质被提供用于语音认证。 该方法包括通过因特网浏览器从用户接收用于认证的语音样本作为对受限访问资源的请求的一部分,将认证请求发送到认证服务器,认证请求将语音样本与先前建立的与 所述用户接收来自所述认证服务器的响应,以及基于所述响应提供对所述受限访问资源的访问。

Patent Agency Ranking