SAVING PROGRAM EXECUTION STATE
    11.
    发明申请
    SAVING PROGRAM EXECUTION STATE 有权
    节省计划执行状态

    公开(公告)号:US20100153955A1

    公开(公告)日:2010-06-17

    申请号:US12334004

    申请日:2008-12-12

    IPC分类号: G06F9/46

    摘要: Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service.

    摘要翻译: 描述了用于管理程序的分布式执行的技术。 在至少一些情况下,这些技术包括将程序的执行分解或以其他方式分离成可以在不同的计算节点上执行的多个不同的执行作业,例如以每个执行作业使用不同的输入子集的并行方式 程序数据。 此外,这些技术可以包括临时终止和稍后恢复至少一些执行作业的执行,例如通过持续地存储执行作业的部分执行的中间状态,以及稍后检索和使用存储的中间状态来恢复执行 执行作业从中间状态。 此外,这些技术可以与代表多个客户或服务的其他用户执行多个程序的分布式程序执行服务结合使用。

    DETECTING INAPPROPRIATE ACTIVITY BY ANALYSIS OF USER INTERACTIONS
    12.
    发明申请
    DETECTING INAPPROPRIATE ACTIVITY BY ANALYSIS OF USER INTERACTIONS 审中-公开
    通过用户互动分析检测不准确的活动

    公开(公告)号:US20080162202A1

    公开(公告)日:2008-07-03

    申请号:US11618309

    申请日:2006-12-29

    IPC分类号: G06Q99/00 G06Q20/00

    摘要: Techniques are described for detecting inappropriate activities based on interactions with Web sites and other electronic information services. In some situations, the techniques involve analyzing user interactions with an electronic information service in order to determine whether the user interactions are likely to reflect fraudulent activities by the user. In at least some situations, information about user interactions may be analyzed by applying one or more assessment tests that are each configured to assess one or more aspects of the interactions and to provide indications of whether those interaction aspects reflect inappropriate activities. If an analysis of one or more user interactions determines that a user is suspected of inappropriate activity, various actions may be taken to inhibit the inappropriate activity from continuing or recurring in the future.

    摘要翻译: 描述了基于与网站和其他电子信息服务的交互来检测不适当活动的技术。 在某些情况下,这些技术涉及分析与电子信息服务的用户交互,以便确定用户交互是否可能反映用户的欺诈活动。 在至少一些情况下,可以通过应用一个或多个评估测试来分析关于用户交互的信息,所述评估测试被配置为评估交互的一个或多个方面,并且提供这些交互方面是否反映不当活动的指示。 如果对一个或多个用户交互的分析确定用户被怀疑是不适当的活动,则可以采取各种措施来阻止不必要的活动在将来继续或重复发生。

    Detecting fraudulent activity by analysis of information requests
    14.
    发明授权
    Detecting fraudulent activity by analysis of information requests 有权
    通过分析信息请求来检测欺诈活动

    公开(公告)号:US08763116B1

    公开(公告)日:2014-06-24

    申请号:US13163526

    申请日:2011-06-17

    IPC分类号: H04L29/06

    摘要: Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity.

    摘要翻译: 描述技术用于抑制尝试欺诈地获得关于用户的机密信息的访问。 在某些情况下,这些技术涉及自动分析至少一些由网站或其他电子信息服务接收到的信息请求,以便确定它们是否可能反映请求发送者或发起请求的其他方的欺诈活动。 例如,如果基于用户与未被授权发起请求的第三方信息源(例如,另一个无关联的网站)的交互来对网站进行请求,则第三方信息源可以是 欺诈性网络钓鱼网站或从事其他类型的欺诈活动。 如果基于一个或多个信息请求的分析来怀疑欺诈活动,则可以采取一种或多种动作来抑制欺诈活动。

    Identifying use of software applications
    15.
    发明授权
    Identifying use of software applications 有权
    识别使用软件应用程序

    公开(公告)号:US08626935B1

    公开(公告)日:2014-01-07

    申请号:US13620814

    申请日:2012-09-15

    IPC分类号: G06F15/16

    摘要: Techniques are described for identifying the use of software applications, such as to determine an identity of a user interacting with a Web site or other electronic information service based on information regarding an application copy used by the user. When a communication is received from a software application, the communication is analyzed to attempt to identify a particular software application copy that sent the communication. Various types of information about a client software application copy may be used in the analysis, including information about particular configuration settings for the client software application and for the client computing device on which the client software application is executing. After a matching software application copy is identified for a received communication, possible inappropriate activities related to the received communication may be identified in various ways, including based on previous communications received from the same software application copy.

    摘要翻译: 描述了用于识别软件应用程序的使用的技术,例如基于与用户使用的应用程序副本有关的信息来确定与网站或其他电子信息服务交互的用户的身份。 当从软件应用程序接收到通信时,分析通信以尝试识别发送通信的特定软件应用程序副本。 可以在分析中使用关于客户端软件应用程序副本的各种类型的信息,包括关于客户端软件应用程序和客户端软件应用程序正在执行的客户端计算设备的特定配置设置的信息。 在针对所接收的通信识别出匹配的软件应用程序副本之后,可以以各种方式识别与所接收的通信相关的可能的不适当活动,包括基于从相同软件应用程序副本接收的先前通信。

    Dynamically monitoring and modifying distributed execution of programs
    16.
    发明授权
    Dynamically monitoring and modifying distributed execution of programs 有权
    动态地监视和修改程序的分布式执行

    公开(公告)号:US08321558B1

    公开(公告)日:2012-11-27

    申请号:US12415773

    申请日:2009-03-31

    IPC分类号: G06F15/16

    摘要: Techniques are described for managing distributed execution of programs. In some situations, the techniques include dynamically monitoring the ongoing distributed execution of a program on a cluster of multiple computing nodes, and may include automatically determining the status of execution of the program on each of the multiple computing nodes and/or automatically determining the aggregate usage of one or more types of computing resources across the cluster of multiple computing nodes by the distributed program execution. The information obtained from the dynamic monitoring may be used in various manners, including to facilitate dynamically modifying the ongoing distributed program execution in various manners, such as to temporarily throttle usage of computing resources by the distributed program execution (e.g., to remove or reduce one or more bottlenecks).

    摘要翻译: 描述了用于管理程序的分布式执行的技术。 在一些情况下,这些技术包括动态地监视多个计算节点的集群上的程序的正在进行的分布式执行,并且可以包括在多个计算节点的每一个上自动确定该程序的执行状态和/或自动地确定该集合 通过分布式程序执行在多个计算节点的群集之间使用一种或多种类型的计算资源。 从动态监视获得的信息可以以各种方式使用,包括有助于以各种方式动态地修改正在进行的分布式程序执行,例如通过分布式程序执行临时调节计算资源的使用(例如,去除或减少一个 或更多的瓶颈)。

    Identifying use of software applications
    17.
    发明授权
    Identifying use of software applications 有权
    识别使用软件应用程序

    公开(公告)号:US08307099B1

    公开(公告)日:2012-11-06

    申请号:US11613007

    申请日:2006-12-19

    IPC分类号: G06F15/16

    摘要: Techniques are described for identifying the use of software applications, such as to determine an identity of a user interacting with a Web site or other electronic information service based on information regarding an application copy used by the user. When a communication is received from a software application, the communication is analyzed to attempt to identify a particular software application copy that sent the communication. Various types of information about a client software application copy may be used in the analysis, including information about particular configuration settings for the client software application and for the client computing device on which the client software application is executing. After a matching software application copy is identified for a received communication, possible inappropriate activities related to the received communication may be identified in various ways, including based on previous communications received from the same software application copy.

    摘要翻译: 描述了用于识别软件应用程序的使用的技术,例如基于与用户使用的应用程序副本有关的信息来确定与网站或其他电子信息服务交互的用户的身份。 当从软件应用程序接收到通信时,分析通信以尝试识别发送通信的特定软件应用程序副本。 可以在分析中使用关于客户端软件应用程序副本的各种类型的信息,包括关于客户端软件应用程序和客户端软件应用程序正在执行的客户端计算设备的特定配置设置的信息。 在针对所接收的通信识别出匹配的软件应用程序副本之后,可以以各种方式识别与所接收的通信相关的可能的不适当活动,包括基于从相同软件应用程序副本接收的先前通信。