-
公开(公告)号:US20170310667A1
公开(公告)日:2017-10-26
申请号:US15518455
申请日:2015-04-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Victor Albuquerque Correa , Humberto Cardoso Marchezi , Roberto Bender , Joao Carrion
CPC classification number: H04L63/0876 , G06F21/35 , H04L9/3239 , H04L63/08 , H04L63/10 , H04L63/102 , H04W12/06
Abstract: Examples disclosed herein relate to acquisition of a device fingerprint from an instance of a client application. Examples include association of a target device fingerprint, based on device context information, with a target user account in a remote service, and acquisition of an application device fingerprint from an unpaired instance of a client application.
-
公开(公告)号:US20200026590A1
公开(公告)日:2020-01-23
申请号:US16334857
申请日:2016-09-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Marlon Gomes Lopez , Guilherme Selau Riberio , Luciano Alves , Humberto Cardoso Marchezi , Brian Schmitz Tani , Leonardo Marquezini , Eduardo Rodel , Josepe Franco Gerent
IPC: G06F11/00 , G06F11/30 , G05B19/4065 , G05B23/02 , G06N20/00
Abstract: Example systems may relate to component failure prediction. A non-transitory computer readable medium may contain instructions to analyze a plurality of features corresponding to a component of a system. The non-transitory computer readable medium may further contain instructions to determine which of the plurality of features to use to model a failure of the component. The non-transitory computer readable medium may contain instructions to generate a plurality of models to model the failure of the component and assemble the plurality of models into a single model for predicting component failure. The non-transitory computer readable medium may further contain instructions to extract data associated with a component failure predicted by the single model and correlate the data associated with the predicted component failure with the single model.
-
公开(公告)号:US11003518B2
公开(公告)日:2021-05-11
申请号:US16334857
申请日:2016-09-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Marlon Gomes Lopez , Guilherme Selau Riberio , Luciano Alves , Humberto Cardoso Marchezi , Brian Schmitz Tani , Leonardo Marquezini , Eduardo Rodel , Josepe Franco Gerent
IPC: G06F11/00 , G06N20/00 , G05B19/4065 , G05B23/02 , G06F11/30
Abstract: Example systems may relate to component failure prediction. A non-transitory computer readable medium may contain instructions to analyze a plurality of features corresponding to a component of a system. The non-transitory computer readable medium may further contain instructions to determine which of the plurality of features to use to model a failure of the component. The non-transitory computer readable medium may contain instructions to generate a plurality of models to model the failure of the component and assemble the plurality of models into a single model for predicting component failure. The non-transitory computer readable medium may further contain instructions to extract data associated with a component failure predicted by the single model and correlate the data associated with the predicted component failure with the single model.
-
公开(公告)号:US10992669B2
公开(公告)日:2021-04-27
申请号:US15518455
申请日:2015-04-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Victor Albuquerque Correa , Humberto Cardoso Marchezi , Roberto Bender , Joao Carrion
Abstract: Examples disclosed herein relate to acquisition of a device fingerprint from an instance of a client application. Examples include association of a target device fingerprint, based on device context information, with a target user account in a remote service, and acquisition of an application device fingerprint from an unpaired instance of a client application.
-
公开(公告)号:US11200466B2
公开(公告)日:2021-12-14
申请号:US15763102
申请日:2015-10-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Humberto Cardoso Marchezi , Taciano Perez , Carlos Haas
Abstract: In an implementation, a non-transitory machine-readable storage medium stores instructions that when executed by a processor, cause the processor to allocate classifier data structures to persistent memory, read a number of categories from a set of training data, and populate the classifier data structures with training data including training-based, category and word probabilities calculated based on the training data.
-
公开(公告)号:US20180276507A1
公开(公告)日:2018-09-27
申请号:US15763102
申请日:2015-10-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Humberto Cardoso Marchezi , Tacíano Perez , Carios Haas
CPC classification number: G06K9/72 , G06F16/3334 , G06F16/3346 , G06K9/6257 , G06K9/6268 , G06N20/00
Abstract: In an implementation, a non-transitory machine-readable storage medium stores instructions that when executed by a processor, cause the processor to allocate classifier data structures to persistent memory, read a number of categories from a set of training data, and populate the classifier data structures with training data including training-based, category and word probabilities calculated based on the training data.
-
公开(公告)号:US09584523B2
公开(公告)日:2017-02-28
申请号:US13664211
申请日:2012-10-30
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Soma Sundaram Santhiveeran , Jose Paulo Xavier Pires , Ricardo Bueno Moreira , Humberto Cardoso Marchezi , Paul Gerhard Schulze
IPC: H04L29/06 , G06F15/173 , G06F15/16
CPC classification number: H04L63/102 , H04L63/02 , H04L63/0272
Abstract: According to an example, a method for virtual private network (VPN) access control includes receiving a request from an application on a user device to access a remote computer network asset, and determining, by a processor, an authorization of the application to access the remote computer network asset based on a policy. In response to a determination that the application is authorized to access the remote computer network asset, the method includes setting a VPN connection between the user device and a remote computer network including the remote computer network asset, and routing traffic from the application to the remote computer network asset via the VPN. In response to a determination that the application is not authorized to access the remote computer network asset, the method includes routing traffic from the application to a network different than the remote computer network.
Abstract translation: 根据一个示例,用于虚拟专用网(VPN)访问控制的方法包括从用户设备上的应用接收请求以访问远程计算机网络资产,以及由处理器确定所述应用的访问权限 基于策略的远程计算机网络资产。 响应于确定应用被授权访问远程计算机网络资产,该方法包括在用户设备和包括远程计算机网络资产的远程计算机网络之间设置VPN连接,以及将路由流量从应用程序路由到远程 计算机网络资产通过VPN。 响应于确定应用程序未被授权访问远程计算机网络资产,该方法包括将流量从应用程序路由到与远程计算机网络不同的网络。
-
-
-
-
-
-