Dynamic creation of temporal networks based on similar search queries
    1.
    发明申请
    Dynamic creation of temporal networks based on similar search queries 审中-公开
    基于类似搜索查询动态创建时间网络

    公开(公告)号:US20150127489A1

    公开(公告)日:2015-05-07

    申请号:US14071361

    申请日:2013-11-04

    CPC classification number: G06Q50/01 G06Q30/0625

    Abstract: Techniques for creating a user network based on user interest in a product are described. For example, a first search query is received from a first client device. The first client device is associated with a first user. A second search query is received from a second client device. The second client device is associated with a second user. The first search query is matched to a product. The second search query is matched to the product. A user network corresponding to the product is created. The first user is added to the user network based on the matching of the first search query to the product. The second user is added to the user network based on the matching of the second search query to the product.

    Abstract translation: 描述了基于用户对产品兴趣创建用户网络的技术。 例如,从第一客户端设备接收第一搜索查询。 第一客户端设备与第一用户相关联。 从第二客户端设备接收第二搜索查询。 第二客户端设备与第二用户相关联。 第一个搜索查询与产品相匹配。 第二个搜索查询与产品相匹配。 创建与产品对应的用户网络。 基于第一搜索查询与产品的匹配,将第一用户添加到用户网络。 基于第二搜索查询与产品的匹配将第二用户添加到用户网络。

    METHOD AND SYSTEM FOR AUTOMATIC DETECTION OF EAVESDROPPING OF AN ACCOUNT BASED ON IDENTIFIERS AND CONDITIONS
    2.
    发明申请
    METHOD AND SYSTEM FOR AUTOMATIC DETECTION OF EAVESDROPPING OF AN ACCOUNT BASED ON IDENTIFIERS AND CONDITIONS 有权
    基于标识符和条件自动检测帐户的方法和系统

    公开(公告)号:US20130298238A1

    公开(公告)日:2013-11-07

    申请号:US13462299

    申请日:2012-05-02

    CPC classification number: G06F21/554

    Abstract: A system and method for detecting whether a user account has been compromised. A server computer determines, for a client device, a first identifier associated with the client device. The server computer analyzes an activity log associated with an account of a user to determine if an eavesdropping condition has been met during a given duration. The analysis includes: 1) determining that an eavesdropping activity has occurred during the given duration and determining that no normal activity has occurred during the given duration for the first identifier; 2) determining a second identifier associated with a second device used to access the user account; and 3) determining that a normal activity associated with the second identifier has occurred during the given duration.

    Abstract translation: 用于检测用户帐户是否已被破坏的系统和方法。 对于客户端设备,服务器计算机确定与客户端设备相关联的第一标识符。 服务器计算机分析与用户帐户相关联的活动日志,以确定在给定持续时间内是否已经满足窃听条件。 分析包括:1)确定在给定持续时间内发生窃听活动,并确定在给定持续时间内第一个标识符没有发生正常活动; 2)确定与用于访问用户帐户的第二设备相关联的第二标识符; 以及3)确定在给定持续时间内已经发生与第二标识符相关联的正常活动。

    System and method for automatically determining an optimal power cap value
    3.
    发明授权
    System and method for automatically determining an optimal power cap value 有权
    自动确定最佳功率上限值的系统和方法

    公开(公告)号:US09015502B2

    公开(公告)日:2015-04-21

    申请号:US13548398

    申请日:2012-07-13

    CPC classification number: G06F1/00 G06F1/3206 G06F1/3234

    Abstract: Generating an optimal power cap value includes steps of: analyzing power usage of a system for a specified period of time; computing a power consumption value for the system for the specified period of time; and generating the optimal power cap value for the system, using the computed power consumption value. The system should be coupled with a power meter and should support power regulation technology.

    Abstract translation: 生成最佳功率上限值包括以下步骤:分析系统在指定时间段内的功耗; 计算系统在指定时间段内的功耗值; 以及使用所计算的功耗值来生成所述系统的最佳功率上限值。 该系统应与功率计耦合,并应支持功率调节技术。

    Method and system for automatic detection of eavesdropping of an account based on identifiers and conditions
    4.
    发明授权
    Method and system for automatic detection of eavesdropping of an account based on identifiers and conditions 有权
    基于标识符和条件自动检测帐户窃听的方法和系统

    公开(公告)号:US08869280B2

    公开(公告)日:2014-10-21

    申请号:US13462299

    申请日:2012-05-02

    CPC classification number: G06F21/554

    Abstract: A system and method for detecting whether a user account has been compromised. A server computer determines, for a client device, a first identifier associated with the client device. The server computer analyzes an activity log associated with an account of a user to determine if an eavesdropping condition has been met during a given duration. The analysis includes: 1) determining that an eavesdropping activity has occurred during the given duration and determining that no normal activity has occurred during the given duration for the first identifier; 2) determining a second identifier associated with a second device used to access the user account; and 3) determining that a normal activity associated with the second identifier has occurred during the given duration.

    Abstract translation: 用于检测用户帐户是否已被破坏的系统和方法。 对于客户端设备,服务器计算机确定与客户端设备相关联的第一标识符。 服务器计算机分析与用户帐户相关联的活动日志,以确定在给定持续时间内是否已经满足窃听条件。 分析包括:1)确定在给定持续时间内发生窃听活动,并确定在给定持续时间内第一个标识符没有发生正常活动; 2)确定与用于访问用户帐户的第二设备相关联的第二标识符; 以及3)确定在给定持续时间内已经发生与第二标识符相关联的正常活动。

    SYSTEM AND METHOD FOR AUTOMATICALLY DETERMINING AN OPTIMAL POWER CAP VALUE
    5.
    发明申请
    SYSTEM AND METHOD FOR AUTOMATICALLY DETERMINING AN OPTIMAL POWER CAP VALUE 有权
    用于自动确定最佳功率值的系统和方法

    公开(公告)号:US20140019779A1

    公开(公告)日:2014-01-16

    申请号:US13548398

    申请日:2012-07-13

    CPC classification number: G06F1/00 G06F1/3206 G06F1/3234

    Abstract: Generating an optimal power cap value includes steps of: analyzing power usage of a system for a specified period of time; computing a power consumption value for the system for the specified period of time; and generating the optimal power cap value for the system, using the computed power consumption value. The system should be coupled with a power meter and should support power regulation technology.

    Abstract translation: 生成最佳功率上限值包括以下步骤:分析系统在指定时间段内的功耗; 计算系统在指定时间段内的功耗值; 以及使用所计算的功耗值来生成所述系统的最佳功率上限值。 该系统应与功率计耦合,并应支持功率调节技术。

Patent Agency Ranking