MACHINE-LEARNING BASED CLASSIFICATION OF USER ACCOUNTS BASED ON EMAIL ADDRESSES AND OTHER ACCOUNT INFORMATION
    41.
    发明申请
    MACHINE-LEARNING BASED CLASSIFICATION OF USER ACCOUNTS BASED ON EMAIL ADDRESSES AND OTHER ACCOUNT INFORMATION 有权
    基于电子邮件地址和其他帐户信息的用户账户的基于机器学习的分类

    公开(公告)号:US20130185230A1

    公开(公告)日:2013-07-18

    申请号:US13349306

    申请日:2012-01-12

    IPC分类号: G06F21/00 G06F15/18 G06F15/16

    摘要: A trust level of an account is determined at least partly based on a degree of the memorability of an email address associated with the account. Additional features such as those based on the domain of the email address and those from the additional information such as name, phone number, and address associated with the account may also be used to determine the trust level of the account. A machine learning process may be used to learn a classification model based on one or more features that distinguish a malicious account from a benign account from training data. The classification model is used to determine a trust level of the account, and/or if the account is malicious or benign, and may be continuously improved by incrementally adapting or improving the model with new accounts.

    摘要翻译: 至少部分地基于与帐户相关联的电子邮件地址的可记忆度来确定帐户的信任级别。 诸如那些基于电子邮件地址域的附加功能以及来自附加信息(例如姓名,电话号码和与该帐户相关联的地址)的功能也可用于确定该帐户的信任级别。 可以使用机器学习过程来基于将恶意帐户与良性帐户与训练数据区分开的一个或多个特征来学习分类模型。 分类模型用于确定帐户的信任级别和/或帐户是恶意的还是良性的,并且可以通过使用新帐户逐步适应或改进模型来不断地改进。

    Security-enhanced log in
    42.
    发明授权
    Security-enhanced log in 有权
    安全增强登录

    公开(公告)号:US08140855B2

    公开(公告)日:2012-03-20

    申请号:US12101166

    申请日:2008-04-11

    IPC分类号: G06F21/00 G06F12/00

    摘要: A security-enhanced login technique that provides a convenient and easy-to-use two factor technique to enhance the security of passwords without requiring any changes on the server side of a client-server network. The technique employs a convenient and easy-to-use two-factor technique to generate strong passwords for Web and other applications. In this technique, a convenient or personal device such as a mouse is used as the other factor besides a user password. A secret stored in the mouse or other personal device is hashed together with the password entered by a user and the server ID, to generate a strong, server-specific password which is used to authenticate the user to the server. This password enhancement operation is carried out inside the personal device.

    摘要翻译: 一种安全增强的登录技术,提供了一种方便易用的双因素技术来增强密码的安全性,而不需要在客户端 - 服务器网络的服务器端进行任何更改。 该技术采用方便易用的双因素技术为Web和其他应用程序生成强大的密码。 在这种技术中,除了用户密码之外,还使用诸如鼠标之类的便利的或个人的设备作为另一个因素。 存储在鼠标或其他个人设备中的秘密与用户输入的密码和服务器ID一起被散列,以生成用于向服务器认证用户的强大的服务器专用密码。 该密码增强操作在个人设备内部进行。

    UNIDIRECTIONAL MULTI-USE PROXY RE-SIGNATURE PROCESS
    43.
    发明申请
    UNIDIRECTIONAL MULTI-USE PROXY RE-SIGNATURE PROCESS 审中-公开
    独立多用途代理签字过程

    公开(公告)号:US20090327735A1

    公开(公告)日:2009-12-31

    申请号:US12146480

    申请日:2008-06-26

    IPC分类号: H04L9/06

    摘要: A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive re-signature generation processes are described. Various embodiments to aggregate part of signatures to reduce the size of re-signed signatures are also described. Various combinations of the proxy re-signature process and the re-signature conversion process result in an overall process that is unidirectional, multi-use, private, and non-interactive. As such, the proxy re-signature system is applicable for use with a wide range of applications.

    摘要翻译: “代理重签名系统”提供了各种技术,用于将消息m上的委托人的签名转换为同一消息中的委托者。 描述非交互式重新签名生成处理的各种实施方式。 还描述了聚合部分签名以减少重新签名的签名的大小的各种实施例。 代理重新签名过程和重新签名转换过程的各种组合导致单向,多用途,私有和非交互的整个过程。 因此,代理重新签名系统适用于广泛的应用。

    DIAGNOSIS OF APPLICATION PERFORMANCE PROBLEMS VIA ANALYSIS OF THREAD DEPENDENCIES
    44.
    发明申请
    DIAGNOSIS OF APPLICATION PERFORMANCE PROBLEMS VIA ANALYSIS OF THREAD DEPENDENCIES 审中-公开
    应用性能问题的诊断通过分析螺纹依赖

    公开(公告)号:US20090320021A1

    公开(公告)日:2009-12-24

    申请号:US12141948

    申请日:2008-06-19

    IPC分类号: G06F9/46

    摘要: A “Performance Evaluator” provides various techniques for tracking system events to diagnose root causes of application performance anomalies. In general, traces of system events involved in inter-thread interactions are collected at application runtime. These traces are then used to construct inter-thread dependency patterns termed “control patterns.” Control patterns are then evaluated to determine root causes of performance anomalies. Where an application terminates abnormally or full traces cannot be collected for some reason, partial control patterns are constructed for that application. In various embodiments, “fingerprints” are then generated from full or partial control patterns and are matched to fingerprints corresponding to operations in other control patterns extracted from reference traces collected on the same or similar systems. Matched fingerprints or control patterns are then used to deduce the root cause of application performance anomalies associated with full or partial traces.

    摘要翻译: “性能评估器”提供了各种跟踪系统事件的技术,以诊断应用程序性能异常的根本原因。 通常,在应用程序运行时收集跨线程交互涉及的系统事件的踪迹。 然后使用这些迹线来构建称为“控制模式”的线程间依赖模式。 然后评估控制模式,以确定性能异常的根本原因。 如果应用程序异常终止或由于某些原因无法收集完整的跟踪,则为该应用程序构建部分控制模式。 在各种实施例中,然后从全部或部分控制模式生成“指纹”,并且与从与在相同或类似系统上收集的参考迹线提取的其他控制模式中的操作相对应的指纹匹配。 然后使用匹配的指纹或控制模式来推断与全部或部分迹线相关的应用程序性能异常的根本原因。