Optimizing communication among collections of computing resources
    71.
    发明授权
    Optimizing communication among collections of computing resources 有权
    优化计算资源集合之间的通信

    公开(公告)号:US08868766B1

    公开(公告)日:2014-10-21

    申请号:US13074982

    申请日:2011-03-29

    IPC分类号: G06F15/16

    摘要: Techniques for provisioning computing resources utilize colorings of collections of resources. The collections may be networks of resources hosted by a computing resource provider that are operated under the direction of one or more customers of the resource provider. Colors may be applied to the collections of resources, such as by a customer of the resource provider. The same customer or another customer may request that resources be provisioned according to at least one relationship with one or more collections of resources having one or more colors. Resources may then be provisioned according to the request.

    摘要翻译: 用于配置计算资源的技术利用资源集合的着色。 集合可以是由资源提供者的一个或多个客户的指导下运行的由计算资源提供者托管的资源的网络。 颜色可以应用于资源集合,例如资源提供者的客户。 相同的客户或其他客户可以根据与具有一种或多种颜色的一个或多个资源集合的至少一个关系来请求提供资源。 然后可以根据请求配置资源。

    System for enabling electronic catalog users to create and share research data
    72.
    发明授权
    System for enabling electronic catalog users to create and share research data 有权
    电子目录用户创建和共享研究数据的系统

    公开(公告)号:US08660910B1

    公开(公告)日:2014-02-25

    申请号:US13620515

    申请日:2012-09-14

    IPC分类号: G06Q30/00

    摘要: Comparative decision systems and methods are disclosed for gathering and mining data representative of purchase decisions. One disclosed comparative decision system detects when a user is comparing items and provides the user with the ability to create a research note storing comparative information for the alternative items. The system displays information about items according to a variety of factors. The user can customize the factors and enter information for each alternative item according to the various factors. Some information may be pre-populated by the system. The research note may be made visible to other users, and may be suggested to another user based on the note's expected helpfulness and relevance to that user. One disclosed method for mining data stored within research notes identifies which factors are given higher relative priorities by users considering a purchase. Another mining method analyzes the effects of price changes on item popularity.

    摘要翻译: 公开了比较决策系统和方法,用于收集和挖掘代表购买决定的数据。 一个披露的比较决定系统检测用户什么时候比较项目并且向用户提供创建存储替代项目的比较信息的研究笔记的能力。 系统根据各种因素显示有关项目的信息。 用户可以根据各种因素定制各种因素并输入每个替代项目的信息。 某些信息可能由系统预先填充。 研究报告可能对其他用户可见,并且可以基于该笔记对该用户的期望的有用性和相关性向另一用户建议。 用于挖掘存储在研究笔记内的数据的一种公开的方法识别考虑购买的用户给出哪些因素具有更高的相对优先级。 另一种挖掘方法分析了价格变化对物品普及度的影响。

    Method for exposing research note data based upon user activity data
    73.
    发明授权
    Method for exposing research note data based upon user activity data 有权
    基于用户活动数据揭示研究笔记数据的方法

    公开(公告)号:US08533052B1

    公开(公告)日:2013-09-10

    申请号:US12950861

    申请日:2010-11-19

    IPC分类号: G06Q30/00

    CPC分类号: G06Q30/0255 G06Q30/0603

    摘要: Comparative decision systems and methods are disclosed for gathering and mining data representative of purchase decisions. One disclosed comparative decision system detects when a user is comparing items and provides the user with the ability to create a research note storing comparative information for the alternative items. The system displays information about items according to a variety of factors. The user can customize the factors and enter information for each alternative item according to the various factors. Some information may be pre-populated by the system. The research note may be made visible to other users, and may be suggested to another user based on the note's expected helpfulness and relevance to that user. One disclosed method for mining data stored within research notes identifies which factors are given higher relative priorities by users considering a purchase. Another mining method analyzes the effects of price changes on item popularity.

    摘要翻译: 公开了比较决策系统和方法,用于收集和挖掘代表购买决定的数据。 一个披露的比较决定系统检测用户什么时候比较项目并且向用户提供创建存储替代项目的比较信息的研究笔记的能力。 系统根据各种因素显示有关项目的信息。 用户可以根据各种因素定制各种因素并输入每个替代项目的信息。 某些信息可能由系统预先填充。 研究报告可能对其他用户可见,并且可以基于该笔记对该用户的期望的有用性和相关性向另一用户建议。 用于挖掘存储在研究笔记内的数据的一种公开的方法识别考虑购买的用户给出哪些因素具有更高的相对优先级。 另一种挖掘方法分析了价格变化对物品普及度的影响。

    Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
    75.
    发明授权
    Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys 有权
    用于识别和合并用不同密钥加密的相同对象的加密系统和方法

    公开(公告)号:US07779253B2

    公开(公告)日:2010-08-17

    申请号:US10855112

    申请日:2004-05-26

    IPC分类号: H04L9/00

    摘要: Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.

    摘要翻译: 描述了使用它们的密码协议和方法。 所描述的协议有利地使得被编码用于具有不同密钥的加密的两个或更多个相同的可加密对象被识别为相同,而不访问加密过程中使用的未加密对象或密钥。 另外,这些协议允许使用不同的加密密钥来处理两个或多个相同的可加密对象,但是以一定的方式存储,使得所需的总存储空间与存储单个可加密对象所需的空间成正比,加上常数 每个不同加密密钥的数量。 在各种实施例中,可加密对象包括文件,并且加密协议使加密文件能够与单实例存储(SIS)系统相关联使用。

    Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
    77.
    发明授权
    Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys 失效
    用于识别和合并用不同密钥加密的相同对象的加密系统和方法

    公开(公告)号:US07437555B2

    公开(公告)日:2008-10-14

    申请号:US10855110

    申请日:2004-05-26

    IPC分类号: H04L9/00

    摘要: Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.

    摘要翻译: 描述了使用它们的密码协议和方法。 所描述的协议有利地使得被编码用于具有不同密钥的加密的两个或更多个相同的可加密对象被识别为相同,而不访问加密过程中使用的未加密对象或密钥。 另外,这些协议允许使用不同的加密密钥来处理两个或多个相同的可加密对象,但是以一定的方式存储,使得所需的总存储空间与存储单个可加密对象所需的空间成正比,加上常数 每个不同加密密钥的数量。 在各种实施例中,可加密对象包括文件,并且加密协议使加密文件能够与单实例存储(SIS)系统相关联使用。

    Encrypted key cache
    78.
    发明授权
    Encrypted key cache 有权
    加密密钥缓存

    公开(公告)号:US07346774B2

    公开(公告)日:2008-03-18

    申请号:US11206525

    申请日:2005-08-18

    IPC分类号: H04L9/00

    CPC分类号: H04L9/0825 H04L9/0894

    摘要: A file that has been encrypted using a symmetric key and that has a corresponding access control entry with the symmetric key encrypted using the public key of a public/private key pair can be accessed. An encrypted key cache is also accessed to determine whether an access control entry to symmetric key mapping exists in the cache for the access control entry corresponding to the file. If such a mapping exists in the cache, then the mapped-to symmetric key is obtained form the cache, otherwise the encrypted symmetric key is decrypted using the private key of the public/private key pair. The encrypted key cache itself can also be encrypted and stored as an encrypted file.

    摘要翻译: 可以访问已经使用对称密钥加密并具有使用公钥/私钥对的公钥加密的对称密钥的相应访问控制条目的文件。 还访问加密密钥高速缓存以确定对应于该文件的访问控制条目的高速缓存中是否存在对称密钥映射的访问控制条目。 如果高速缓存中存在这样的映射,则从高速缓存获得映射到对称密钥,否则使用公钥/私钥对的私钥解密加密的对称密钥。 加密的密钥缓存本身也可以加密并存储为加密文件。

    Locating potentially identical objects across multiple computers based on stochastic partitioning of workload
    79.
    发明授权
    Locating potentially identical objects across multiple computers based on stochastic partitioning of workload 有权
    基于工作负载的随机分区,在多台计算机上定位潜在的相同对象

    公开(公告)号:US07272630B2

    公开(公告)日:2007-09-18

    申请号:US10991571

    申请日:2004-11-18

    IPC分类号: G06F15/13

    摘要: Potentially identical objects (e.g., files) are located across multiple computers based on stochastic partitioning of workload. For each of a plurality of objects stored on a plurality of computers in a network, a portion of object information corresponding to the object is selected. The object information can be generated in a variety of manners (e.g., based on hashing the object, based on characteristics of the object, and so forth). Any of a variety of portions of the object information can be used (e.g., the least significant bits of the object information). A stochastic partitioning process is then used to identify which of the plurality of computers to communicate the object information to for identification of potentially identical objects on the plurality of computers.

    摘要翻译: 基于工作负载的随机划分,潜在地相同的对象(例如,文件)位于多个计算机之间。 对于存储在网络中的多个计算机上的多个对象中的每一个,选择与对象相对应的对象信息的一部分。 可以以各种方式生成对象信息(例如,基于对象的散列,基于对象的特征等)。 可以使用对象信息的各种部分中的任何一个(例如,对象信息的最低有效位)。 然后使用随机划分过程来识别多个计算机中的哪个计算机传达对象信息以便在多个计算机上识别可能相同的对象。

    Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
    80.
    发明授权
    Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys 失效
    用于识别和合并用不同密钥加密的相同对象的加密系统和方法

    公开(公告)号:US07266689B2

    公开(公告)日:2007-09-04

    申请号:US10855109

    申请日:2004-05-26

    IPC分类号: H04L9/00

    摘要: Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable Objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.

    摘要翻译: 描述了使用它们的密码协议和方法。 所描述的协议有利地使得被编码用于具有不同密钥的加密的两个或更多个相同的可加密对象被识别为相同,而不访问在加密过程中使用的未加密对象或密钥。 另外,这些协议允许使用不同的加密密钥来处理两个或多个相同的可加密对象,但是以一定的方式存储,使得所需的总存储空间与存储单个可加密对象所需的空间成正比,加上常数 每个不同加密密钥的数量。 在各种实施例中,可加密对象包括文件,并且加密协议使加密文件能够与单实例存储(SIS)系统相关联使用。