Method and system for tracking machines on a network using fuzzy GUID technology
    2.
    发明授权
    Method and system for tracking machines on a network using fuzzy GUID technology 有权
    使用模糊GUID技术在网络上跟踪机器的方法和系统

    公开(公告)号:US08141148B2

    公开(公告)日:2012-03-20

    申请号:US11550395

    申请日:2006-10-17

    IPC分类号: H04L29/06

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Inflatable protective container for bottles and the like
    3.
    发明授权
    Inflatable protective container for bottles and the like 失效
    用于瓶子的充气保护容器等

    公开(公告)号:US5833069A

    公开(公告)日:1998-11-10

    申请号:US696653

    申请日:1996-08-14

    申请人: David G. Jones

    发明人: David G. Jones

    IPC分类号: B65D81/03 B65D81/05 B65D1/02

    摘要: An inflatable container for housing fragile articles, such as bottles and the like, for protecting the enclosed article from breakage during shipping or transit. The container comprises a generally cylindrical inflatable housing shaped to conform to a specific bottle shape and having an inflation device for enabling user inflation. The housing has an open bottom end for receiving a bottle type article therein. An inflatable base is sized for mating engagement with said bottom end thereby covering said opening. A fastening apparatus is provided for securing the base to the housing, and a seal is provided between said housing bottom and said base thereby forming a hermetic seal for preventing escape of any solid, liquid, or vapor contents enclosed within the housing in the event of breakage.

    摘要翻译: 用于容纳诸如瓶子等脆弱物品的可充气容器,用于在运输或运输过程中保护封闭物品免于破损。 该容器包括大致圆柱形的可充气壳体,其成形为符合特定的瓶子形状并且具有用于使用户充气的充气装置。 壳体具有敞开的底端,用于在其中接收瓶型制品。 可充气基座的尺寸适于与所述底端配合接合,从而覆盖所述开口。 提供一种紧固装置,用于将基座固定到壳体上,并且在所述壳体底部和所述基座之间设置密封件,从而形成气密密封件,用于防止在壳体内封闭的任何固体,液体或蒸气内容物逸出, 破损。

    Wear analysis equipment
    6.
    发明授权
    Wear analysis equipment 失效
    磨损分析设备

    公开(公告)号:US4492461A

    公开(公告)日:1985-01-08

    申请号:US357553

    申请日:1982-03-12

    IPC分类号: G01N15/06 G01N33/28

    CPC分类号: G01N15/0612

    摘要: An improved method of producing a deposit of particles from a liquid medium carrier on a substrate for subsequent optical analysis of the particles, involves feeding the liquid medium carrying the particles to the substrate via a flexible tube which is not subjected to fluctuating lateral compressions. The invention has particular relevance to the making of Ferrograms from wear debris in a sample of machine lubricant.

    摘要翻译: 一种从基材上的液体介质载体产生颗粒沉积物的改进方法,用于随后的颗粒的光学分析,包括通过未经受波动的侧向压缩的柔性管将携带颗粒的液体介质送入基板。 本发明与在机器润滑剂样品中的磨损碎屑的制造特别相关。

    Omnidirectional clock
    7.
    再颁专利
    Omnidirectional clock 失效
    全方位时钟

    公开(公告)号:USRE30987E

    公开(公告)日:1982-06-29

    申请号:US146387

    申请日:1980-05-05

    申请人: David G. Jones

    发明人: David G. Jones

    IPC分类号: G04B19/04 G04B19/06 G04B45/00

    CPC分类号: G04B19/06 G04B19/04 G04B45/00

    摘要: A clock has a clock face in the form of an axially symmetric solid, e.g. a sphere, a cone or a cylinder. Clock hands extend around the clock face following a helical path, and time-indicating markings are arranged on all the surfaces of the face. It is therefore possible for a complete set of these markings to be seen from any direction relative to the clock face. The hands are normally driven by a conventional clock movement, there being an hour hand and a minute hand. However, it would be possible in some applications to have only a single hand, e.g. a minute hand, and to drive the clock face relative to the hand. The markings are arranged along helical paths, corresponding to the helical shape of the hands.

    Method and system for tracking machines on a network using fuzzy guid technology
    8.
    发明授权
    Method and system for tracking machines on a network using fuzzy guid technology 有权
    使用模糊指导技术在网络上跟踪机器的方法和系统

    公开(公告)号:US08782783B2

    公开(公告)日:2014-07-15

    申请号:US13372480

    申请日:2012-02-13

    摘要: A method for querying a knowledgebase of malicious hosts numbered from 1 through N. The method includes providing a network of computers, which has a plurality of unknown malicious host machines. In a specific embodiment, the malicious host machines are disposed throughout the network of computers, which includes a world wide network of computers, e.g., Internet. The method includes querying a knowledge base including a plurality of known malicious hosts, which are numbered from 1 through N, where N is an integer greater than 1. In a preferred embodiment, the knowledge base is coupled to the network of computers. The method includes receiving first information associated with an unknown host from the network; identifying an unknown host and querying the knowledge base to determine if the unknown host is one of the known malicious hosts in the knowledge base. The method also includes outputting second information associated with the unknown host based upon the querying process.

    摘要翻译: 一种用于查询从1到N编号的恶意主机的知识库的方法。该方法包括提供具有多个未知恶意主机的计算机网络。 在具体实施例中,恶意主机被布置在整个计算机网络中,计算机网络包括诸如因特网的全球计算机网络。 该方法包括查询包括从1到N编号的多个已知恶意主机的知识库,其中N是大于1的整数。在优选实施例中,知识库耦合到计算机网络。 该方法包括从网络接收与未知主机相关联的第一信息; 识别未知主机并查询知识库以确定未知主机是知识库中已知的恶意主机之一。 该方法还包括基于查询过程输出与未知主机相关联的第二信息。

    Method for tracking machines on a network using multivariable fingerprinting of passively available information
    9.
    发明授权
    Method for tracking machines on a network using multivariable fingerprinting of passively available information 有权
    使用被动信息的多变量指纹识别网络上的机器的方法

    公开(公告)号:US08176178B2

    公开(公告)日:2012-05-08

    申请号:US12022022

    申请日:2008-01-29

    IPC分类号: G06F15/173

    摘要: A method for tracking machines on a network of computers. The method includes determining one or more assertions to be monitored by a first web site which is coupled to a network of computers. The method monitors traffic flowing to the web site through the network of computers and identifies the one or more assertions from the traffic coupled to the network of computers to determine a malicious host coupled to the network of computers. The method includes associating a first IP address and first hardware finger print to the assertions of the malicious host and storing information associated with the malicious host in one or more memories of a database. The method also includes identifying an unknown host from a second web site, determining a second IP address and second hardware finger print with the unknown host, and determining if the unknown host is the malicious host.

    摘要翻译: 一种在计算机网络上跟踪机器的方法。 该方法包括确定要由耦合到计算机网络的第一网站监视的一个或多个断言。 该方法监视通过计算机网络流向网站的流量,并从耦合到计算机网络的流量中识别一个或多个断言,以确定耦合到计算机网络的恶意主机。 该方法包括将第一IP地址和第一硬件指纹关联到恶意主机的断言,并将与恶意主机相关联的信息存储在数据库的一个或多个存储器中。 该方法还包括从第二网站识别未知主机,使用未知主机确定第二IP地址和第二硬件指纹,以及确定未知主机是否是恶意主机。