Personal assistant context building
    141.
    发明授权
    Personal assistant context building 有权
    个人助理上下文建设

    公开(公告)号:US09171092B2

    公开(公告)日:2015-10-27

    申请号:US13991382

    申请日:2012-12-07

    Inventor: Ezekiel Kruglick

    Abstract: Technologies related to personal assistant context building are generally described. In some examples, network service communications, such as network traffic resulting from the use of mobile applications or “apps” on a mobile device, may be captured, parsed, and included in personal assistant context databases for use in configuring automated personal assistant user interaction operations. In some examples, parsing services may be provided to parse forwarded network service communications and generate converted data for inclusion in personal assistant context databases.

    Abstract translation: 通常描述与个人助理上下文建立相关的技术。 在一些示例中,诸如在移动设备上使用移动应用或“应用”导致的网络流量的网络服务通信可以被捕获,解析并包含在个人助理上下文数据库中,以用于配置自动化的个人助理用户交互 操作。 在一些示例中,可以提供解析服务来解析转发的网络服务通信并生成转换的数据以包含在个人助理上下文数据库中。

    Repeater emulation to increase network range
    142.
    发明授权
    Repeater emulation to increase network range 有权
    中继器仿真增加网络范围

    公开(公告)号:US09124337B2

    公开(公告)日:2015-09-01

    申请号:US14128201

    申请日:2013-08-30

    Inventor: Ezekiel Kruglick

    CPC classification number: H04B7/145 H04B7/15507 H04W56/00

    Abstract: Technologies are generally described for methods and systems configured to increase a range of a network. In an example, a method for increasing a range of a first network may include sending a request by a communication device to a network device while the communication device is in a range of the first network. The request may include a request for discovery data that identifies the first network. The method may further include receiving, by the communication device, the discovery data. The method may further include broadcasting, by the communication device, information based on the discovery data when the communication device is outside the range of the first network and when the communication device is configured to communicate over a second network. The second network may be different from the first network.

    Abstract translation: 一般来说,为配置成增加网络范围的方法和系统来描述技术。 在一个示例中,用于增加第一网络的范围的方法可以包括在通信设备处于第一网络的范围内时通过通信设备向网络设备发送请求。 该请求可以包括对识别第一网络的发现数据的请求。 该方法还可以包括由通信设备接收发现数据。 该方法还可以包括当通信设备在第一网络的范围之外时以及当通信设备被配置为通过第二网络通信时,由通信设备基于发现数据广播信息。 第二网络可能与第一网络不同。

    SMART POWER BACKGROUND TO VALIDATE USER
    143.
    发明申请
    SMART POWER BACKGROUND TO VALIDATE USER 有权
    SMART POWER背景来验证用户

    公开(公告)号:US20150229658A1

    公开(公告)日:2015-08-13

    申请号:US14352655

    申请日:2013-08-28

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described to implement intrusion detection based on smart power background. In some examples, upon detection of an attempt to access a resource, a power line ambiance may be determined at a location of a device on which the attempt to access the resource is executed. The power line ambiance may be based on a connection of the device and/or one or more other devices at the location to a power line. The captured/received power profiles may identify device signatures enabling generation of a digest of the location. An intrusion detection system (IDS), may receive the digest of the location and compare the digest to previous digests associated with an authorized client of the resource to evaluate an authenticity of the attempt. If the authenticity of the attempt is suspicious, the IDS may elevate security by employing one or more verification levels and/or one or more authentication techniques.

    Abstract translation: 技术通常被描述为实现基于智能电源背景的入侵检测。 在一些示例中,在检测到访问资源的尝试时,可以在执行尝试访问资源的设备的位置处确定电力线路环境。 电力线环境可以基于设备和/或位于电力线路处的一个或多个其他设备的连接。 捕获/接收的功率简档可以识别能够生成位置的摘要的设备签名。 入侵检测系统(IDS)可以接收位置的摘要,并将摘要与与资源的授权客户端相关联的以前的摘要进行比较,以评估尝试的真实性。 如果尝试的真实性是可疑的,则IDS可以通过采用一个或多个验证级别和/或一种或多种认证技术提高安全性。

    COMPOSITION DATA DISPATCHER
    144.
    发明申请
    COMPOSITION DATA DISPATCHER 有权
    组合数据分配器

    公开(公告)号:US20150178880A1

    公开(公告)日:2015-06-25

    申请号:US14375296

    申请日:2013-12-24

    Inventor: Ezekiel Kruglick

    CPC classification number: G06T1/20

    Abstract: Technologies are generally described for methods and systems effective to associate composition data with a graphics processing unit so that a corresponding model may be manipulated and an image produced. According to some examples, the methods may include receiving, by a dispatcher, first composition data that corresponds to a first model. The methods may also include associating, by the dispatcher, the first composition data with a first graphics processing unit. The methods may also include receiving, by the dispatcher, second composition data that corresponds to a second model. The methods may include determining, by the dispatcher, that the second model is stored in a second graphics processing unit different from the first graphics processing unit. The methods may also include associating, by the dispatcher, the second composition data with the second graphics processing unit based on the determination that the second model is stored in the second graphics processing unit.

    Abstract translation: 通常描述了有效地将组合数据与图形处理单元相关联的方法和系统的技术,使得可以操纵对应的模型并生成图像。 根据一些示例,所述方法可以包括由调度器接收对应于第一模型的第一组合数据。 所述方法还可以包括由调度器将第一组合数据与第一图形处理单元相关联。 所述方法还可以包括由调度器接收对应于第二模型的第二组合数据。 方法可以包括由调度员确定第二模型被存储在与第一图形处理单元不同的第二图形处理单元中。 方法还可以包括基于第二模型被存储在第二图形处理单元中的确定,调度员将第二组合数据与第二图形处理单元相关联。

    Virtual machine monitor (VMM) extension for time shared accelerator management and side-channel vulnerability prevention
    145.
    发明授权
    Virtual machine monitor (VMM) extension for time shared accelerator management and side-channel vulnerability prevention 有权
    用于时间共享加速器管理和侧边漏洞预防的虚拟机监视器(VMM)扩展

    公开(公告)号:US09043923B2

    公开(公告)日:2015-05-26

    申请号:US13885160

    申请日:2012-12-27

    Inventor: Ezekiel Kruglick

    CPC classification number: G06F21/55 G06F9/5027 G06F21/556

    Abstract: Technologies are presented for automatically generating accelerator code for datacenter users, detecting multiple hardware tenants with overlapping accelerator needs, and managing the accelerator needs of the tenants so that they can share use of programmable accelerator hardware. In some examples, the accelerator code may also be customer supplied. In other examples, a delay that simulates accelerator programming for a user first accessing an accelerator that was virtualized from a pre-existing one may be applied. By simulating the delay, co-location detection (a form of side channel attack) may be prevented.

    Abstract translation: 提供了用于为数据中心用户自动生成加速器代码的技术,检测具有重叠加速器需求的多个硬件租户,以及管理租户的加速器需求,以便他们可以共享可编程加速器硬件的使用。 在一些示例中,加速器代码也可以是客户提供的。 在其他示例中,可以应用模拟用户首先访问从预先存在的加速器虚拟化的加速器的加速器编程的延迟。 通过模拟延迟,可以防止协同位置检测(侧向信道攻击的形式)。

    REACTIVE LOOP SENSING IN MULTI-DATACENTER DEPLOYMENTS
    146.
    发明申请
    REACTIVE LOOP SENSING IN MULTI-DATACENTER DEPLOYMENTS 有权
    多元化处理器中的反应性环路感测

    公开(公告)号:US20150135176A1

    公开(公告)日:2015-05-14

    申请号:US14238470

    申请日:2013-04-30

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally provided for reactive loop sensing in multi-datacenter deployments. In some examples, tagged metrics from deployment elements on different datacenter or platform providers may be used by a stability module to generate a synthetic generalized deployment model that aliases multiple system elements into general state vectors. The state vectors may include a transfer vector on the border between each datacenter or platform, and the feedback from the metrics may cause the states of the datacenters/platforms to match the deployment's unobserved variables allowing stability analysis before failure. For example, the metrics may be associated with a portion of the deployment on one of the multiple datacenters. The stability analysis module may compare the received metrics with model metrics derived from a model of the multi-datacenter deployment to determine the stability of the deployment and/or adjust the model for increased stability.

    Abstract translation: 通常为多数据中心部署中的反应环路检测提供技术。 在一些示例中,稳定性模块可以使用来自不同数据中心或平台提供商上的部署元素的标记度量来生成将多个系统元素设为通用状态向量的合成广义部署模型。 状态向量可以包括在每个数据中心或平台之间的边界上的传输向量,并且来自度量的反馈可以导致数据中心/平台的状态与部署的未观察到的变量匹配,从而允许在故障之前进行稳定性分析。 例如,度量可以与多个数据中心之一上的部署部分相关联。 稳定性分析模块可以将接收到的度量与来自多数据中心部署模型的模型度量进行比较,以确定部署的稳定性和/或调整模型以增加稳定性。

    MEMORY DEDUPLICATION MASKING
    147.
    发明申请
    MEMORY DEDUPLICATION MASKING 有权
    记忆显示屏蔽

    公开(公告)号:US20150134829A1

    公开(公告)日:2015-05-14

    申请号:US14376125

    申请日:2013-11-08

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for virtual machine memory deduplication protection through memory deduplication masking. In some examples, a virtual machine manager (VMM) that receives data to be written to memory may initially write the data to entries in a temporary shadow paging table and then subsequently opportunistically update the memory and an associated hardware-assisted paging (HAP) table. Upon receiving a read request for the received data before the data has been written to the memory, the VMM may check the HAP table and determine that the requested data is not available from the memory. Upon determining that the received data is not available from the memory, the VMM may respond to the read request by sending the received data stored in the shadow paging table entries.

    Abstract translation: 通常通过内存重复数据删除掩码来描述技术,用于虚拟机内存重复数据删除保护。 在一些示例中,接收要写入存储器的数据的虚拟机管理器(VMM)可以最初将数据写入临时影子页面表中的条目,然后随机机会地更新存储器和相关联的硬件辅助寻呼(HAP)表 。 在数据被写入存储器之前,在接收到的数据的读取请求之后,VMM可以检查HAP表并确定所请求的数据不能从存储器中获得。 在确定接收到的数据不能从存储器获得时,VMM可以通过发送存储在阴影寻呼表条目中的接收数据来响应读请求。

    INJECTED ANALYTICS SERVICE FOR WEB DISTRIBUTED INTERFACES
    148.
    发明申请
    INJECTED ANALYTICS SERVICE FOR WEB DISTRIBUTED INTERFACES 审中-公开
    WEB分布式接口注入分析服务

    公开(公告)号:US20150134776A1

    公开(公告)日:2015-05-14

    申请号:US14351508

    申请日:2013-07-19

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for integrating an injected analytics service into a user interface (UI) content distribution system to generate per-user and per-control level analytics for web distributed interfaces. In some examples, an analytics engine of the UI content distribution system may generate differentiated analytics payload elements for each control destination at the point of UI content distribution. The analytics engine may then inject the analytics payload elements into UI content payloads delivered to each destination. The differentiated analytics payload elements may create distinct analytics output for data processing and analysis at a distributed user interface (DUI) analytics database, even when multiple devices or users are part of a same application session or login.

    Abstract translation: 通常将技术描述为将注入的分析服务集成到用户界面(UI)内容分发系统中,以生成针对Web分布式接口的每用户和每个控制级分析。 在一些示例中,UI内容分发系统的分析引擎可以在UI内容分发的点处为每个控制目的地生成差异化的分析有效负载元素。 然后,分析引擎将分析有效负载元素注入到递送到每个目的地的UI内容有效载荷中。 即使在多个设备或用户是相同的应用程序会话或登录的一部分时,差异化分析有效负载元素也可以在分布式用户界面(DUI)分析数据库中为数据处理和分析创建不同的分析输出。

    MALICIOUS ATTACK PREVENTION THROUGH CARTOGRAPHY OF CO-PROCESSORS AT DATACENTER
    149.
    发明申请
    MALICIOUS ATTACK PREVENTION THROUGH CARTOGRAPHY OF CO-PROCESSORS AT DATACENTER 有权
    通过DATACENTER协同处理器的拼图防止恶意攻击

    公开(公告)号:US20150128268A1

    公开(公告)日:2015-05-07

    申请号:US14371730

    申请日:2013-11-06

    Abstract: Technologies are directed to prevention of malicious attacks through cartography of co-processors at a datacenter. According to some examples, configuration data to create a co-processor at a field programmable gate array (FPGA) may be received at a configuration controller. The configuration controller may determine unused arrangements for the co-processor and unused placements at the FPGA corresponding to the unused arrangements. The used arrangements and the unused placements, associated with a type of the co-processor, may be stored in a configuration matrix. One of the unused arrangements and one of the unused placements corresponding to the selected unused arrangement may then be selected by the configuration controller to create the co-processor.

    Abstract translation: 技术旨在通过在数据中心制图协同处理器来防止恶意攻击。 根据一些示例,可以在配置控制器处接收在现场可编程门阵列(FPGA)处创建协处理器的配置数据。 配置控制器可以确定协处理器的未使用的配置和对应于未使用的布置的FPGA处的未使用的布置。 与协处理器的类型相关联的所使用的布置和未使用的布置可以存储在配置矩阵中。 然后可以由配置控制器选择一个未使用的布置和对应于所选择的未使用布置的一个未使用的布置以创建协处理器。

    SUPPRESSION OF DISCOVERY OF MOBILE DEVICES IN A WIRELESS NETWORK
    150.
    发明申请
    SUPPRESSION OF DISCOVERY OF MOBILE DEVICES IN A WIRELESS NETWORK 审中-公开
    抑制移动设备在无线网络中的发现

    公开(公告)号:US20150023233A1

    公开(公告)日:2015-01-22

    申请号:US14506220

    申请日:2014-10-03

    Inventor: Ezekiel Kruglick

    Abstract: Technologies are generally described for suppressing discovery of mobile devices in a wireless ubiquitous computing (ubicomp) network, reducing the number of network transmissions by devices in the network and reducing network congestion and prolonging battery life. A mobile device may add supplementary information to introductory beacons transmitted by the device that indicate no response is necessary from other devices participating in the network except for a coordinator of the network. The mobile device may transmit a malformed introductory beacon that will be ignored by other devices in the network except for the coordinator. The coordinator of the wireless network may detect the mobile device moving through the network and transmit a suppression signal to other devices in the network causing the devices to ignore the introductory beacons transmitted by the mobile device.

    Abstract translation: 通常描述技术来抑制在无线普遍计算(ubicomp)网络中的移动设备的发现,减少网络中设备的网络传输数量,并减少网络拥塞并延长电池寿命。 移动设备可以向设备发送的介绍性信标添加辅助信息,该信号指示除了网络的协调器之外,参与网络的其他设备不需要响应。 移动设备可以发送将被网络中除协调器之外的其他设备忽略的格式不正确的介绍性信标。 无线网络的协调器可以检测通过网络移动的移动设备,并将抑制信号发送到网络中的其他设备,使得设备忽略由移动设备发送的介绍性信标。

Patent Agency Ranking