-
公开(公告)号:US09111079B2
公开(公告)日:2015-08-18
申请号:US13015180
申请日:2011-01-27
申请人: Eugene (John) Neystadt , Daniel Alon , Yair Tor , Mark Novak , Khaja E. Ahmed , Yoav Yassour
发明人: Eugene (John) Neystadt , Daniel Alon , Yair Tor , Mark Novak , Khaja E. Ahmed , Yoav Yassour
CPC分类号: G06F21/335 , G06F21/57 , G06F2221/2129 , H04L63/0807 , H04L63/0876 , H04L63/10 , H04L63/1433
摘要: Embodiments of the invention make the issuance of trustworthy device claims available to client devices as a service, so that a client device to which device claims are issued may use the device claims in relation to an attempt to access a network application. The service may conduct an assessment of the device's characteristics and/or state, characterize the results of this assessment in device claims, and issue the device claims to the device. The service may be accessible to a client device from outside administrative boundaries of an entity that makes a network application accessible, and thus may be useful to entities making network applications accessible in business-to-consumer (B2C) and business-to-business (B2B) topologies, such as over the publicly accessible Internet.
摘要翻译: 本发明的实施例使可信赖的设备权利要求的发布可用作客户端设备作为服务,从而发布设备权利要求的客户端设备可以相对于访问网络应用的尝试使用设备权利要求。 该服务可以对设备的特性和/或状态进行评估,表征设备权利要求中的该评估的结果,并向设备发出设备声明。 客户端设备可以从实现网络应用的实体的外部管理边界访问该服务,因此对于使企业对消费者(B2C)和企业对企业(B2C)可访问的网络应用的实体可能是有用的 B2B)拓扑,例如通过可公开访问的互联网。
-
公开(公告)号:US20130085844A1
公开(公告)日:2013-04-04
申请号:US13252213
申请日:2011-10-04
IPC分类号: G06Q30/02
摘要: Online sellers may be ranked based on feedback given by people trusted by an individual user. The user may trust people in their social networks, as well as people who may be experts in a particular field, and the seller's ranking may be calculated by weighting reviews or feedback from trusted people higher than people unknown to the user. When used with a social campaign management system, ranking of products from multiple online sellers may include coupons or incentives that are available through the user's social network, as well as discounts or incentives that may be targeted to the user's status within their own social network.
摘要翻译: 在线卖家可能会根据个人用户信任的反馈来排名。 用户可以信任他们的社交网络中的人,以及可能是特定领域的专家的人,并且可以通过加权来自比用户未知的人的信任的人的评论或反馈来计算卖家的排名。 当与社交活动管理系统一起使用时,来自多个在线卖家的产品的排名可以包括可通过用户社交网络获得的优惠券或奖励,以及可以针对用户在其自己的社交网络内的状态的折扣或奖励。
-
公开(公告)号:US20120303827A1
公开(公告)日:2012-11-29
申请号:US13114044
申请日:2011-05-24
申请人: Eugene (John) NEYSTADT , Daniel ALON , Daniel ROSE , Elan LEVY
发明人: Eugene (John) NEYSTADT , Daniel ALON , Daniel ROSE , Elan LEVY
IPC分类号: G06F15/16
CPC分类号: H04L63/107 , G06F21/6218 , G06F2221/2111 , G06F2221/2115
摘要: A policy enforcement system may use device location as a parameter for granting or denying access to a resource. An access policy may include location parameters that may permit or deny access to the resource based on the physical location of the device. In some cases, the location may be authenticated by a server that may verify the device's location. The access policy may grant or deny full or partial access to the resource, which may be a data resource, such as a file, database, URL, or other information, an application resource, or a physical resource such as a network or a peripheral device. The policy enforcement system may use the device location for regulatory compliance, restricting access to sensitive information, or as a primary or secondary condition for limiting access to a resource.
摘要翻译: 策略执行系统可以使用设备位置作为用于授予或拒绝对资源的访问的参数。 访问策略可以包括可以基于设备的物理位置来允许或拒绝对资源的访问的位置参数。 在某些情况下,位置可以由可能验证设备位置的服务器进行身份验证。 访问策略可以授予或拒绝对资源的全部或部分访问,该资源可以是数据资源,例如文件,数据库,URL或其他信息,应用资源或诸如网络或外围设备的物理资源 设备。 策略执行系统可以使用设备位置来执行合规性,限制对敏感信息的访问,或者限制对资源的访问的主要或次要条件。
-
公开(公告)号:US20120209920A1
公开(公告)日:2012-08-16
申请号:US13042463
申请日:2011-03-08
申请人: Eugene (John) Neystadt , Ron Karidi , Yitzhak Tzahi Weisfeild , Moshe Tennenholtz , Kira Radinsky , Roy Varshavsky
发明人: Eugene (John) Neystadt , Ron Karidi , Yitzhak Tzahi Weisfeild , Moshe Tennenholtz , Kira Radinsky , Roy Varshavsky
CPC分类号: G06Q30/0201 , G06F16/9535
摘要: Social influencers may be identified for specific usage contexts and for influencer type. Influencers may be categorized by mavens, connectors, salesmen, or other categories. Within each usage context, a unified data model may be used to collect data from multiple sources, including multiple social networks, as well as to collect data from different levels of influencers in each usage context. The relevance of various communication media as well as the frequency and quality of use of the media may be factors used to determine a person's effectiveness as a specific type of influencer within a usage context.
摘要翻译: 社会影响者可以针对具体使用情况和影响者类型进行识别。 影响者可以通过商品,连接器,推销员或其他类别进行分类。 在每个使用情况下,可以使用统一的数据模型来从多个来源(包括多个社交网络)收集数据,以及从每个使用环境中的不同级别的影响者收集数据。 各种通信媒体的相关性以及媒体的频率和使用质量可以是用于在使用上下文中确定个人作为特定类型的影响者的有效性的因素。
-
公开(公告)号:US20120209674A1
公开(公告)日:2012-08-16
申请号:US13041452
申请日:2011-03-07
申请人: Eugene (John) Neystadt , Ron Karidi , Yitzhak Tzahi Weisfeild , Moshe Tennenholtz , Kira Radinsky , Roy Varshavsky
发明人: Eugene (John) Neystadt , Ron Karidi , Yitzhak Tzahi Weisfeild , Moshe Tennenholtz , Kira Radinsky , Roy Varshavsky
IPC分类号: G06Q30/00
CPC分类号: G06Q30/0207 , G06Q50/01
摘要: A social marketing system may reward and incentivize participants, and may also have a fraud detection system. The manager may create social marketing campaigns that may be simulated to determine an expected set of activities, which may be compared to an actual set of activities. A fraud detection system may detect abnormal activity and may bring the activity to a manager's attention and may also punish the participants by withholding rewards, lowering the participant's reputation, or some other punishment mechanism.
摘要翻译: 社会营销系统可以奖励和激励参与者,也可能有欺诈检测系统。 经理可以创建可以模拟的社交营销活动,以确定预期的一组活动,这可以与一组实际的活动进行比较。 欺诈检测系统可能会检测到异常活动,并可能引起经理注意的活动,也可以通过扣留奖励,降低参与者的声誉或其他惩罚机制来惩罚参与者。
-
公开(公告)号:US20120144489A1
公开(公告)日:2012-06-07
申请号:US12961854
申请日:2010-12-07
申请人: Michael Sean Jarrett , Joseph Jared Johnson , Vishal Kapoor , Anil Francis Thomas , Eugene John Neystadt , Dennis Scott Batchelder
发明人: Michael Sean Jarrett , Joseph Jared Johnson , Vishal Kapoor , Anil Francis Thomas , Eugene John Neystadt , Dennis Scott Batchelder
IPC分类号: G06F21/00
CPC分类号: G06F21/566 , G06F9/45558 , G06F21/568 , G06F2009/45587
摘要: The subject disclosure is directed towards protecting virtual machines on guest partitions from malware in a resource-efficient manner. Antimalware software is divided into lightweight agents that run on each malware-protected guest partition, a shared scanning and signature update mechanism, and a management component. Each agent provides the scanning mechanism with files to scan for malware, such as by running a script, and receives results from the scanning mechanism including possible remediation actions to perform. The management component provides the scanning mechanism with access to virtual machine services, such as to pause, resume, snapshot and rollback guest partitions as requested by the scanning mechanism.
摘要翻译: 主题公开旨在以资源有效的方式保护来宾分区上的虚拟机与恶意软件。 反恶意软件分为在每个受恶意软件保护的客户机分区,共享扫描和签名更新机制以及管理组件上运行的轻量级代理。 每个代理为扫描机构提供扫描恶意软件的文件,例如通过运行脚本,并从扫描机制接收结果,包括可执行的修复操作。 管理组件为扫描机制提供了访问虚拟机服务的扫描机制,例如按照扫描机制的要求暂停,恢复,快照和回滚客户机分区。
-
公开(公告)号:US10116580B2
公开(公告)日:2018-10-30
申请号:US12163046
申请日:2008-06-27
IPC分类号: G06F15/16 , H04L12/911 , H04W76/10
摘要: Described is a technology by which a seamless automatic connection to an (e.g., corporate) network is made for a client device. Upon detecting a need for a connection to a network, such as by intercepting a communication directed towards a network destination, a list of available connection methods is automatically obtained based on the device's current location data (e.g., LAN or remote) and policy information. An available connection method from the list is selected, e.g., in order, and an attempt is made to establish a connection via that connection method. If the attempt fails, another attempt is made with a different connection method, and so on, until a connection method succeeds. Additional seamlessness from the user's perspective is provided via a credentials vault, by which stored credentials may be retrieved and used in association with the access method being attempted.
-
公开(公告)号:US09344432B2
公开(公告)日:2016-05-17
申请号:US12822724
申请日:2010-06-24
申请人: Yair Tor , Daniel Rose , Eugene (John) Neystadt , Patrik Schnell , Moshe Sapir , Oleg Ananiev , Arthur Zavalkovsky , Anat Eyal
发明人: Yair Tor , Daniel Rose , Eugene (John) Neystadt , Patrik Schnell , Moshe Sapir , Oleg Ananiev , Arthur Zavalkovsky , Anat Eyal
CPC分类号: H04L63/102 , G06F21/33 , G06F21/41 , H04L63/0807 , H04L63/0823 , H04L63/10 , H04L63/107 , H04L63/164
摘要: Embodiments of the invention provide techniques for basing access control decisions at the network layer at least in part on information provided in claims, which may describe attributes of a computer requesting access, one or more resources to which access is requested, the user, the circumstances surrounding the requested access, and/or other information. The information may be evaluated based on one or more access control policies, which may be pre-set or dynamically generated, and used in making a decision whether to grant or deny the computer access to the specified resource(s).
摘要翻译: 本发明的实施例提供了至少部分地基于在权利要求中提供的信息来在网络层基础访问控制决策的技术,其可以描述请求访问的计算机的属性,请求访问的一个或多个资源,用户,情况 围绕所请求的访问,和/或其他信息。 可以基于可以被预先设置或动态生成的一个或多个访问控制策略来评估信息,并且用于做出是否授予或拒绝计算机对指定资源的访问的决定。
-
公开(公告)号:US20120209832A1
公开(公告)日:2012-08-16
申请号:US13042460
申请日:2011-03-08
申请人: Eugene (John) Neystadt , Ron Karidi , Yitzhak Tzahi Weisfeld , Roy Varshavsky , Avigad Oron , Kira Radinsky
发明人: Eugene (John) Neystadt , Ron Karidi , Yitzhak Tzahi Weisfeld , Roy Varshavsky , Avigad Oron , Kira Radinsky
CPC分类号: G06F17/30867 , G06Q30/0282 , G06Q50/01
摘要: A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's reputation may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks.
摘要翻译: 可以根据每个用户的专业知识分类以及个人对特定类别的用户的信任来计算一组排名的用户。 用户排名可能用于呈现搜索结果,建议,社交营销或其他用途。 一个人的声誉可以通过各种在线活动来确定。 一个人对另一个人的信任可能与一个或多个社交网络中的邻近度和活动有关。
-
公开(公告)号:US20120084851A1
公开(公告)日:2012-04-05
申请号:US13015180
申请日:2011-01-27
申请人: Eugene (John) Neystadt , Daniel Alon , Yair Tor , Mark Novak , Khaja E. Ahmed , Yoav Yassour
发明人: Eugene (John) Neystadt , Daniel Alon , Yair Tor , Mark Novak , Khaja E. Ahmed , Yoav Yassour
IPC分类号: G06F7/04
CPC分类号: G06F21/335 , G06F21/57 , G06F2221/2129 , H04L63/0807 , H04L63/0876 , H04L63/10 , H04L63/1433
摘要: Embodiments of the invention make the issuance of trustworthy device claims available to client devices as a service, so that a client device to which device claims are issues may use the device claims in relation to an attempt to access a network application. The service may conduct an assessment of the device's characteristics and/or state, characterize the results of this assessment in device claims, and issue the device claims to the device. The service may be accessible to a client device from outside administrative boundaries of an entity that makes a network application accessible, and thus may be useful to entities making network applications accessible in business-to-consumer (B2C) and business-to-business (B2B) topologies, such as over the publicly accessible Internet.
摘要翻译: 本发明的实施例使可信赖的设备权利要求的发布作为服务可用于客户端设备,使得设备要求的客户端设备是问题,可以使用与访问网络应用的尝试有关的设备权利要求。 该服务可以对设备的特性和/或状态进行评估,表征设备权利要求中的该评估的结果,并向设备发出设备声明。 客户端设备可以从实现网络应用的实体的外部管理边界访问该服务,因此对于使企业对消费者(B2C)和企业对企业(B2C)可访问的网络应用的实体可能是有用的 B2B)拓扑,例如通过可公开访问的互联网。
-
-
-
-
-
-
-
-
-