Identifying purpose-based origin-destination using call detailed records
    2.
    发明授权
    Identifying purpose-based origin-destination using call detailed records 有权
    使用呼叫详细记录识别基于目的的起始目的地

    公开(公告)号:US09042908B2

    公开(公告)日:2015-05-26

    申请号:US13467035

    申请日:2012-05-08

    CPC classification number: G08G1/012 H04M15/58

    Abstract: Access is obtained to call data records (or other data) for a plurality of mobile telephony users. The call data records (or other data) include location-time sequences. For each of the mobile telephony users, corresponding ones of the location-time sequences are segmented into trips; a home-work-school classification model is used to determine a home location and a work-school location, based on the trips; and a trip purpose classification model is used to assign each of the trips a purpose label, based at least on comparing at least one of a start location and an end location for each one of the trips to at least one of the home location and the work-school location determined using the home-work-school classification model. The trips are aggregated into purpose based origin-destination categories based at least on the purpose labels, time ranges of the location-time sequences, and the start and end locations.

    Abstract translation: 获得访问以呼叫多个移动电话用户的数据记录(或其他数据)。 呼叫数据记录(或其他数据)包括位置时间序列。 对于每个移动电话用户,将相应的位置时间序列分段为行程; 家庭工作学校分类模型用于根据旅行情况确定住所和工作地点; 并且旅行目的分类模型用于将每个行程分配目的标签,至少基于将每个行程的起始位置和结束位置中的至少一个比较到本地位置和 使用家庭工作学校分类模型确定工作学校的位置。 至少基于目的标签,位置 - 时间序列的时间范围以及开始和结束位置,将旅行聚合到基于目的的起始 - 目的地类别。

    Method and apparatus for security-aware elasticity of application and services
    3.
    发明授权
    Method and apparatus for security-aware elasticity of application and services 有权
    应用和服务的安全感知弹性的方法和装置

    公开(公告)号:US08793766B2

    公开(公告)日:2014-07-29

    申请号:US13419037

    申请日:2012-03-13

    CPC classification number: G06F21/604 G06F2209/5019

    Abstract: In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.

    Abstract translation: 在用于扩展/降低应用程序的安全性(非功能))组件的方法中,确定(a)每个非安全(功能)组件具有的多个交互的安全组件的交互类型和每种类型的交互的数量, 要求。 根据(a)和对应用程序的传入请求的预期数量确定(b)与涉及非安全组件的安全组件的请求类型和与其相互作用,以及(c)与 涉及非安全组件的安全组件,用于针对涉及非安全组件的安全组件的每种请求类型。 为每个安全组件确定涉及非安全组件的每种类型的请求所需的容量以及涉及非安全组件的每种类型的交互所需的容量。 将安全组件的能力改变为新能力,其中新能力基于(a),(c)和确定的能力。

    METHOD AND APPARATUS FOR EFFICIENT AND ACCURATE ANALYTICS WITH CROSS-DOMAIN CORRELATION
    6.
    发明申请
    METHOD AND APPARATUS FOR EFFICIENT AND ACCURATE ANALYTICS WITH CROSS-DOMAIN CORRELATION 有权
    有效和准确的跨域关联分析的方法和装置

    公开(公告)号:US20120215829A1

    公开(公告)日:2012-08-23

    申请号:US13029699

    申请日:2011-02-17

    CPC classification number: G06F15/18 G06N99/005

    Abstract: A method of generating analytics to provide an analysis of data from distinct data domains includes collecting sensor data from at least two distinct data domains, deriving parameters from the collected data, wherein at least one of the parameters is a first domain parameter derived from one of the data domains and at least another one of the parameters is a second domain parameter derived from the other data domain, providing a data model that enables a user to specify at least one of the first parameters and at least one of the second domain parameters and generate at least one rule based on the selected parameters, and generating analytics that analyze the collected data against the rules to determinate whether the rules have been satisfied and provide results of the analysis to a user of the analytics.

    Abstract translation: 生成分析以提供来自不同数据域的数据分析的方法包括从至少两个不同的数据域收集传感器数据,从所收集的数据中导出参数,其中至少一个参数是从 所述数据域和所述参数中的至少另一个参数是从所述其他数据域导出的第二域参数,提供使得用户能够指定所述第一参数中的至少一个和所述第二域参数中的至少一个的数据模型, 基于所选择的参数生成至少一个规则,以及生成分析数据,根据规则分析所收集的数据,以确定规则是否已被满足,并向分析用户提供分析结果。

    Enabling Service Virtualization in a Cloud
    8.
    发明申请
    Enabling Service Virtualization in a Cloud 有权
    在云中启用服务虚拟化

    公开(公告)号:US20110296021A1

    公开(公告)日:2011-12-01

    申请号:US12789924

    申请日:2010-05-28

    CPC classification number: G06F9/5072

    Abstract: A service-level specification for information technology services is obtained from a user. The service-level specification is mapped into an information technology specific deployment plan. Information technology specific resources are deployed in accordance with the information technology specific deployment plan to provide the information technology services.

    Abstract translation: 从用户处获取信息技术服务的服务级规范。 服务级别规范被映射到特定于信息技术的部署计划。 信息技术具体资源按照信息技术具体部署计划部署,提供信息技术服务。

    Method and apparatus for failure resilient forwarding of data over a computer network
    9.
    发明授权
    Method and apparatus for failure resilient forwarding of data over a computer network 失效
    通过计算机网络对数据进行故障恢复转发的方法和装置

    公开(公告)号:US07969869B2

    公开(公告)日:2011-06-28

    申请号:US12135764

    申请日:2008-06-09

    Abstract: In one embodiment, a method and an apparatus for failure-resilient forwarding of data over a computer network include introducing a marker into the data stream, e.g., at the sending node, and allowing, in turn, forwarding nodes and/or receivers to efficiently track data stream reception. The marker functions as a checkpoint for the data transport process, and is identified and indexed at each forwarding node and receiver. Each receiver saves the marker prior to delivering data to an application, thereby designating a point in the data stream at which all preceding data is confirmed to have been delivered to the application. Thus, if a forwarding node fails, the receiver may request stream data from an alternate forwarding node by specifying to the alternate forwarding node to provide data starting from the marker.

    Abstract translation: 在一个实施例中,用于通过计算机网络进行数据故障恢复转发的方法和装置包括将标记引入到数据流中,例如在发送节点处,并且允许有效地转发节点和/或接收器 跟踪数据流接收。 标记用作数据传输过程的检查点,并在每个转发节点和接收器处被识别和索引。 每个接收器在将数据传送到应用程序之前保存标记,从而指定数据流中的所有先前数据被确认已被递送到应用的点。 因此,如果转发节点发生故障,则接收方可以通过指定备用转发节点从标记开始提供数据来从备用转发节点请求流数据。

    Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
    10.
    发明授权
    Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks 失效
    用于提高内容分发网络对分布式拒绝服务攻击的弹性的方法和装置

    公开(公告)号:US07836295B2

    公开(公告)日:2010-11-16

    申请号:US10207695

    申请日:2002-07-29

    CPC classification number: H04L63/1408 H04L63/1458 H04L67/1002

    Abstract: Several deterrence mechanisms suitable for content distribution networks (CDN) are provided. These include a hash-based request routing scheme and a site allocation scheme. The hash-based request routing scheme provides a way to distinguish legitimate requests from bogus requests. Using this mechanism, an attacker is required to generate O(n2)amount of traffic to victimize a CDN-hosted site when the site content is served from n CDN caches. Without these modifications, the attacker must generate only O(n) traffic to bring down the site. The site allocation scheme provides sufficient isolation among CDN-hosted Web sites to prevent an attack on one Web site from making other sites unavailable. Using an allocation strategy based on binary codes, it can be guaranteed that a successful attack on any individual Web site that disables its assigned servers, does not also bring down other Web sites hosted by the CDN.

    Abstract translation: 提供了适用于内容分发网络(CDN)的几种威慑机制。 这些包括基于散列的请求路由方案和站点分配方案。 基于散列的请求路由方案提供了一种区分合法请求与假请求的方法。 使用这种机制,当从n个CDN缓存提供站点内容时,攻击者需要生成O(n2)个流量来伤害CDN托管站点。 没有这些修改,攻击者必须只生成O(n)流量才能关闭该站点。 站点分配方案可以在CDN托管的网站之间提供足够的隔离,以防止一个网站的攻击使其他站点不可用。 使用基于二进制代码的分配策略,可以保证对任何单个网站的成功攻击禁用其分配的服务器,也不会导致其他由CDN托管的网站。

Patent Agency Ranking