PROVISION OF A VIRTUAL ENVIRONMENT BASED ON REAL TIME DATA
    3.
    发明申请
    PROVISION OF A VIRTUAL ENVIRONMENT BASED ON REAL TIME DATA 审中-公开
    基于实时数据提供虚拟环境

    公开(公告)号:WO2015099687A1

    公开(公告)日:2015-07-02

    申请号:PCT/US2013/077611

    申请日:2013-12-23

    Abstract: Apparatus, computer-readable storage medium, and method associated with provision of a virtual environment. In embodiments, a computing apparatus may include a processor and a virtualization module. The virtualization module may be operated by the processor to provide the virtual environment, based at least in part on real time data of a physical environment virtualized in the virtual environment. In embodiments, the computing apparatus may further include a physical environment module. The physical environment module may be operated by the processor to acquire the real time data of the physical environment for the virtualization module. Other embodiments may be described and/or claimed.

    Abstract translation: 装置,计算机可读存储介质和与提供虚拟环境相关联的方法。 在实施例中,计算设备可以包括处理器和虚拟化模块。 该虚拟化模块可以由处理器操作以至少部分地基于在虚拟环境中虚拟化的物理环境的实时数据来提供虚拟环境。 在实施例中,计算设备还可以包括物理环境模块。 物理环境模块可以由处理器操作以获取虚拟化模块的物理环境的实时数据。 可以描述和/或要求保护其他实施例。

    PROTECTION SYSTEM INCLUDING MACHINE LEARNING SNAPSHOT EVALUATION
    4.
    发明申请
    PROTECTION SYSTEM INCLUDING MACHINE LEARNING SNAPSHOT EVALUATION 审中-公开
    保护系统,包括机器学习快速评估

    公开(公告)号:WO2015094271A1

    公开(公告)日:2015-06-25

    申请号:PCT/US2013/076489

    申请日:2013-12-19

    Abstract: This disclosure is directed to a protection system including machine learning snapshot evaluation. A device may comprise a machine learning engine (MLE) to generate snapshots of device operation. The MLE may use active or planned operations in the snapshot to learn user behavior. Once normal user behavior is established for the device, the MLE may be able to determine when snapshots include unusual behavior that may signify a threat to the device. Snapshots determined to include unusual behavior may be transmitted to a remote resource for evaluation. The remote resource may include at least a user behavior classification engine (UBCE) to classify the user behavior by characterizing it as at least one type of use. The snapshot may be analyzed by the UBCE to determine if potential threats exist in the device, and the threat analysis may be provided to the device for evaluation and/or corrective action.

    Abstract translation: 本公开涉及包括机器学习快照评估的保护系统。 设备可以包括机器学习引擎(MLE)以产生设备操作的快照。 快照中的MLE可以使用活动或计划的操作来学习用户行为。 一旦为设备建立了正常的用户行为,MLE可能能够确定何时快照包括可能意味着对设备的威胁的异常行为。 确定包含异常行为的快照可能会传输到远程资源进行评估。 远程资源可以至少包括用户行为分类引擎(UBCE),以通过将用户行为表征为至少一种类型的用途来对用户行为进行分类。 UBCE可以分析快照,以确定设备中是否存在潜在威胁,并且威胁分析可以提供给设备进行评估和/或纠正措施。

    PEER-BASED COLLABORATIVE DISCOVERY AND SIGNALING OF ANOTHER DEVICE IN LIMITED-SIGNAL AREAS
    9.
    发明申请
    PEER-BASED COLLABORATIVE DISCOVERY AND SIGNALING OF ANOTHER DEVICE IN LIMITED-SIGNAL AREAS 审中-公开
    基于对等的协作发现和信号在其他信号领域的其他设备

    公开(公告)号:WO2013126063A1

    公开(公告)日:2013-08-29

    申请号:PCT/US2012/026333

    申请日:2012-02-23

    Abstract: Generally, this disclosure describes a method and system for peer-based collaborative discovery and signaling of another device in limited signal areas. A method may include, in an embodiment, initiating a sensing mode in a seek mobile device in response to receiving an indication that a location of a lost mobile device is unknown; capturing first position data if a signal from the lost device is detected; capturing second position data in response to losing the signal from the lost device; and determining an estimated location of the lost device based on the first position data and the second position data, wherein the lost device is located in an area of limited or no connectivity and the seek device is moving through the area.

    Abstract translation: 通常,本公开描述了用于在有限信号区域中的基于对等的协作发现和另一设备的信令的方法和系统。 一种方法可以包括在一个实施例中,响应于接收到丢失的移动设备的位置未知的指示,在搜索移动设备中发起感测模式; 如果检测到来自丢失设备的信号,则捕获第一位置数据; 响应于丢失来自丢失设备的信号捕获第二位置数据; 以及基于所述第一位置数据和所述第二位置数据来确定所述丢失设备的估计位置,其中所述丢失设备位于有限或无连接的区域中,并且所述搜索设备正在通过所述区域移动。

    METHOD, APPARATUS AND SYSTEM FOR PERFORMING ACCESS CONTROL AND INTRUSION DETECTION ON ENCRYPTED DATA
    10.
    发明申请
    METHOD, APPARATUS AND SYSTEM FOR PERFORMING ACCESS CONTROL AND INTRUSION DETECTION ON ENCRYPTED DATA 审中-公开
    用于对加密数据进行访问控制和侵入检测的方法,装置和系统

    公开(公告)号:WO2007111662A3

    公开(公告)日:2008-02-21

    申请号:PCT/US2006047905

    申请日:2006-12-14

    CPC classification number: H04L63/1416

    Abstract: A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a partition on the host. The partition may utilize Direct Memory Access ("DMA") to access session key stored in a host OS. The partition may thereafter utilize the session key to perform intrusion detection on encrypted data from the application.

    Abstract translation: 一种方法,装置和系统启用对加密数据的访问控制和入侵检测。 具体来说,节点上的应用数据可以被路由到主机上的分区。 分区可以利用直接存储器访问(“DMA”)来访问存储在主机OS中的会话密钥。 该分区之后可以利用该会话密钥对来自该应用的加密数据进行入侵检测。

Patent Agency Ranking