DETECTING FRAUDULENT ACTIVITY BY ANALYSIS OF INFORMATION REQUESTS
    11.
    发明申请
    DETECTING FRAUDULENT ACTIVITY BY ANALYSIS OF INFORMATION REQUESTS 审中-公开
    通过信息需求分析检测欺诈活动

    公开(公告)号:US20140250526A1

    公开(公告)日:2014-09-04

    申请号:US14278623

    申请日:2014-05-15

    Abstract: Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity.

    Abstract translation: 描述技术用于抑制尝试欺诈地获得关于用户的机密信息的访问。 在某些情况下,这些技术涉及自动分析至少一些由网站或其他电子信息服务接收到的信息请求,以便确定它们是否可能反映请求发送者或发起请求的其他方的欺诈活动。 例如,如果基于用户与未被授权发起请求的第三方信息源(例如,另一个无关联的网站)的交互来对网站进行请求,则第三方信息源可以是 欺诈性网络钓鱼网站或从事其他类型的欺诈活动。 如果基于一个或多个信息请求的分析来怀疑欺诈活动,则可以采取一种或多种动作来抑制欺诈活动。

    SAVING PROGRAM EXECUTION STATE
    14.
    发明申请

    公开(公告)号:US20180129570A1

    公开(公告)日:2018-05-10

    申请号:US15867516

    申请日:2018-01-10

    CPC classification number: G06F11/1451 G06F9/4806 G06F9/485 G06F11/1469

    Abstract: Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service.

    Detecting fraudulent activity by analysis of information requests
    15.
    发明授权
    Detecting fraudulent activity by analysis of information requests 有权
    通过分析信息请求来检测欺诈活动

    公开(公告)号:US09497216B2

    公开(公告)日:2016-11-15

    申请号:US14278623

    申请日:2014-05-15

    Abstract: Techniques are described for use in inhibiting attempts to fraudulently obtain access to confidential information about users. In some situations, the techniques involve automatically analyzing at least some requests for information that are received by a Web site or other electronic information service, such as to determine whether they likely reflect fraudulent activities by the request senders or other parties that initiate the requests. For example, if a request is being made to a Web site based on a user's interaction with a third-party information source (e.g., another unaffiliated Web site) that is not authorized to initiate the request, the third-party information source may be a fraudulent phishing site or engaging in other types of fraudulent activity. If fraudulent activity is suspected based on analysis of one or more information requests, one or more actions may be taken to inhibit the fraudulent activity.

    Abstract translation: 描述技术用于抑制尝试欺诈地获得关于用户的机密信息的访问。 在某些情况下,这些技术涉及自动分析至少一些由网站或其他电子信息服务接收到的信息请求,以便确定它们是否可能反映请求发送者或发起请求的其他方的欺诈活动。 例如,如果基于用户与未被授权发起请求的第三方信息源(例如,另一个无关联的网站)的交互来对网站进行请求,则第三方信息源可以是 欺诈性网络钓鱼网站或从事其他类型的欺诈活动。 如果基于一个或多个信息请求的分析来怀疑欺诈活动,则可以采取一种或多种动作来抑制欺诈活动。

    SAVING PROGRAM EXECUTION STATE
    16.
    发明申请
    SAVING PROGRAM EXECUTION STATE 审中-公开
    节省计划执行状态

    公开(公告)号:US20150169412A1

    公开(公告)日:2015-06-18

    申请号:US14571093

    申请日:2014-12-15

    CPC classification number: G06F11/1451 G06F9/4806 G06F9/485 G06F11/1469

    Abstract: Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service.

    Abstract translation: 描述了用于管理程序的分布式执行的技术。 在至少一些情况下,这些技术包括将程序的执行分解或以其他方式分离成可以在不同的计算节点上执行的多个不同的执行作业,例如以每个执行作业使用不同的输入子集的并行方式 程序数据。 此外,这些技术可以包括临时终止和稍后恢复至少一些执行作业的执行,例如通过持续地存储执行作业的部分执行的中间状态,以及稍后检索和使用存储的中间状态来恢复执行 执行作业从中间状态。 此外,这些技术可以与代表多个客户或服务的其他用户执行多个程序的分布式程序执行服务结合使用。

    MANAGING DISTRIBUTED EXECUTION OF PROGRAMS
    17.
    发明申请
    MANAGING DISTRIBUTED EXECUTION OF PROGRAMS 审中-公开
    管理程序的分布式执行

    公开(公告)号:US20140330981A1

    公开(公告)日:2014-11-06

    申请号:US14338150

    申请日:2014-07-22

    CPC classification number: H04L67/1008 G06F9/485 H04L29/08135 H04L67/16

    Abstract: Techniques are described for managing distributed execution of programs. In some situations, the techniques include determining configuration information to be used for executing a particular program in a distributed manner on multiple computing nodes and/or include providing information and associated controls to a user regarding ongoing distributed execution of one or more programs to enable the user to modify the ongoing distributed execution in various manners. Determined configuration information may include, for example, configuration parameters such as a quantity of computing nodes and/or other measures of computing resources to be used for the executing, and may be determined in various manners, including by interactively gathering values for at least some types of configuration information from an associated user (e.g., via a GUI that is displayed to the user) and/or by automatically determining values for at least some types of configuration information (e.g., for use as recommendations to a user).

    Abstract translation: 描述了用于管理程序的分布式执行的技术。 在某些情况下,技术包括确定用于在多个计算节点上以分布式方式执行特定程序的配置信息和/或包括向用户提供关于一个或多个程序的正在进行的分布式执行的信息和相关控制,以使能 用户以各种方式修改正在进行的分布式执行。 确定的配置信息可以包括例如诸如计算节点的数量的配置参数和/或要用于执行的计算资源的其他度量,并且可以以各种方式来确定,包括通过交互地收集至少一些 来自相关用户的配置信息的类型(例如,经由显示给用户的GUI)和/或通过自动确定至少一些类型的配置信息(例如,用作对用户的建议)的值。

    Saving program execution state
    18.
    发明授权

    公开(公告)号:US11263084B2

    公开(公告)日:2022-03-01

    申请号:US15867516

    申请日:2018-01-10

    Abstract: Techniques are described for managing distributed execution of programs. In at least some situations, the techniques include decomposing or otherwise separating the execution of a program into multiple distinct execution jobs that may each be executed on a distinct computing node, such as in a parallel manner with each execution job using a distinct subset of input data for the program. In addition, the techniques may include temporarily terminating and later resuming execution of at least some execution jobs, such as by persistently storing an intermediate state of the partial execution of an execution job, and later retrieving and using the stored intermediate state to resume execution of the execution job from the intermediate state. Furthermore, the techniques may be used in conjunction with a distributed program execution service that executes multiple programs on behalf of multiple customers or other users of the service.

    DYNAMIC NETWORK DEVICE CONFIGURATION
    20.
    发明申请
    DYNAMIC NETWORK DEVICE CONFIGURATION 审中-公开
    动态网络设备配置

    公开(公告)号:US20160352569A1

    公开(公告)日:2016-12-01

    申请号:US15235589

    申请日:2016-08-12

    Abstract: A dynamic configuration system can manage and configure switches or other network devices that come online in a network. When the dynamic configuration system determines that a network device has come online, the dynamic configuration system can identify the network device (e.g., based on its network location, neighbors, fingerprint, identifier, address or the like), select the appropriate configuration data for the network based on the desired network topology, and transmit the configuration data to the network device. The network device can then load the configuration data and function as a component of the desired network topology.

    Abstract translation: 动态配置系统可以管理和配置网络中联机的交换机或其他网络设备。 当动态配置系统确定网络设备已经上线时,动态配置系统可以识别网络设备(例如,基于其网络位置,邻居,指纹,标识符,地址等),选择适当的配置数据 基于所需网络拓扑的网络,并将配置数据发送到网络设备。 网络设备然后可以加载配置数据并且作为所需网络拓扑的组成部分。

Patent Agency Ranking