Multiple simultaneous link transmissions for a multi-frequency multi-rate multi-transceiver communications device
    61.
    发明授权
    Multiple simultaneous link transmissions for a multi-frequency multi-rate multi-transceiver communications device 有权
    用于多频多速率多收发器通信设备的多个同时链路传输

    公开(公告)号:US09402244B2

    公开(公告)日:2016-07-26

    申请号:US13744133

    申请日:2013-01-17

    CPC classification number: H04W72/005 H04L12/1881 H04W4/06 H04W4/12 H04W72/0453

    Abstract: An apparatus includes a network node configured to communicate with other network nodes via a communication network. The network node includes a plurality of transceivers and a controller. The controller includes a link management module and a packet management module. The link management module is configured to produce link profiles associated with communication links available to the network node, wherein a link profile indicates link characteristics that include a busy indication of a transceiver. The packet management module is configured to identify a link profile solution set that includes a set of link profiles corresponding to communication links for multicasting the message packet, map the link profiles of the link profile solution set to at least a portion of the plurality of transceivers, and initiate transmission of the message packet using the communication links corresponding to the link profile solution set.

    Abstract translation: 一种装置包括被配置为经由通信网络与其他网络节点通信的网络节点。 网络节点包括多个收发器和控制器。 控制器包括链路管理模块和分组管理模块。 链路管理模块被配置为产生与可用于网络节点的通信链路相关联的链路简档,其中链路简档指示包括收发器的忙指示的链路特性。 分组管理模块被配置为识别链路简档解决方案集合,其包括与用于多播消息分组的通信链路相对应的一组链路简档,将链路简档解决方案集合的链路简档映射到多个收发器的至少一部分 并且使用与链路简档解集合相对应的通信链路来发起消息分组的传输。

    Systems and methods for monitoring and mitigating information leaks
    62.
    发明授权
    Systems and methods for monitoring and mitigating information leaks 有权
    用于监控和减轻信息泄漏的系统和方法

    公开(公告)号:US09390272B2

    公开(公告)日:2016-07-12

    申请号:US13934658

    申请日:2013-07-03

    CPC classification number: G06F21/60 H04L63/04 H04L63/1433

    Abstract: Systems and methods are disclosed for determining whether a third party observer could determine that an organization has an intent with respect to subject matter based on the organization's web activity. The determination that there is a risk of information leaks to the third party observer can be completed by analyzing the entropy of web usage information destined for the third party observer's servers. Systems and methods are also disclosed for mitigating the risk of information leaks by obscuring the organization's web activity. The web activity can be obscured by selecting candidate actions that can be used to generate neutralizing web traffic from the organization's network which will obscure an intent with respect to a particular subject matter. For example, the candidate actions can identify specific queries, links, or actions that the organization can take to neutralize their web activity to a less remarkable point in the search space.

    Abstract translation: 公开了用于确定第三方观察者是否可以基于组织的网络活动来确定组织具有关于主题的意图的系统和方法。 可以通过分析发往第三方观察者的服务器的Web使用信息的熵来完成对第三方观察者有信息泄漏的风险的确定。 还披露了系统和方法,以通过掩盖组织的网络活动来减轻信息泄露的风险。 可以通过选择可用于从组织的网络生成中和的网络流量的候选动作来掩盖网络活动,这将掩盖关于特定主题的意图。 例如,候选动作可以识别组织可以采取的具体查询,链接或动作,以将其网络活动中和到搜索空间中不太重要的一点。

    ADAPTOR IMPLEMENTATION FOR INTERNET PROTOCOL ADDRESS AND PORT HOPPING
    63.
    发明申请
    ADAPTOR IMPLEMENTATION FOR INTERNET PROTOCOL ADDRESS AND PORT HOPPING 有权
    适应互联网协议地址和端口篡改的实现

    公开(公告)号:US20160036691A1

    公开(公告)日:2016-02-04

    申请号:US14449876

    申请日:2014-08-01

    Abstract: A system and method of deploying a network hopping adaptor is disclosed. In some embodiments, a network hopping adaptor may be configured to manipulate network traffic so as to change at least one network characteristic of the network traffic, and at least one network interface of a machine selected from a group of machines may be configured to send the network traffic to the network hopping adaptor. The network hopping adaptor may manipulate such characteristics as an IP address, a port number, an encryption algorithm or a compression algorithm. The group of machines may be deployed as virtual machines being executed by a virtualization server, and the network hopping adaptor may be implemented on another virtual machine being executed by the virtualization server. Alternatively, or in addition, the group of machines or the network hopping adaptor may be implemented as physical machines.

    Abstract translation: 公开了部署网络跳变适配器的系统和方法。 在一些实施例中,网络跳变适配器可以被配置为操纵网络流量,以便改变网络流量的至少一个网络特性,并且从一组机器中选择的机器的至少一个网络接口可以被配置为发送 网络流量到网络跳转适配器。 网络跳转适配器可以操纵诸如IP地址,端口号,加密算法或压缩算法之类的特征。 该组机器可以部署为由虚拟化服务器执行的虚拟机,并且网络跳变适配器可以在由虚拟化服务器执行的另一个虚拟机上实现。 或者或另外,机器组或网络跳变适配器可以被实现为物理机器。

    MAGNETIC RAM ARRAY ARCHITECTURE
    64.
    发明申请
    MAGNETIC RAM ARRAY ARCHITECTURE 有权
    磁记忆阵列架构

    公开(公告)号:US20160035404A1

    公开(公告)日:2016-02-04

    申请号:US14812812

    申请日:2015-07-29

    Abstract: A magnetic random access memory (MRAM) array including: a plurality of MRAM cells arranged in an array configuration, each comprising a first type nTron and a magnetic memory element; a wordline select circuit comprising of a second type nTron to drive a plurality of parallel wordlines; and a plurality of bitline select circuits, each comprising of said second type nTron for writing to and reading from a column of memory cells in the array and each capable of selecting a single MRAM cell for a memory read or write operation, wherein the second nTron has a higher current drive than the first nTron.

    Abstract translation: 一种磁性随机存取存储器(MRAM)阵列,包括:以阵列结构排列的多个MRAM单元,每个包括第一类型nTron和磁存储元件; 字线选择电路,包括用于驱动多个平行字线的第二类型nTron; 以及多个位线选择电路,每个包括所述第二类型nTron,用于写入阵列中的一列存储器单元并且从阵列中的一列存储单元读取它们,并且每个能够选择用于存储器读或写操作的单个MRAM单元,其中第二nTron 具有比第一个nTron更高的电流驱动。

    Holevo capacity achieving joint detection receiver
    65.
    发明授权
    Holevo capacity achieving joint detection receiver 有权
    孔容量实现联合检测接收机

    公开(公告)号:US09236883B2

    公开(公告)日:2016-01-12

    申请号:US13872857

    申请日:2013-04-29

    Inventor: Saikat Guha

    CPC classification number: H04L27/223 H03M13/05 H04B10/1121 H04B10/70

    Abstract: A computer device may receive a codebook, and generate a unitary transformation operator for the codebook. Furthermore, the computer device may decompose the unitary transformation operator into representations of two or more devices, and cause a generating of a layout of a photonic circuit that includes the two or more devices.

    Abstract translation: 计算机设备可以接收码本,并生成用于码本的单一变换算子。 此外,计算机设备可以将单一变换算子分解成两个或更多个器件的表示,并且使得生成包括两个或更多个器件的光子电路的布局。

    Synthetic processing diversity with multiple architectures within a homogeneous processing environment
    66.
    发明授权
    Synthetic processing diversity with multiple architectures within a homogeneous processing environment 有权
    在均匀处理环境中具有多种架构的合成处理多样性

    公开(公告)号:US09218483B2

    公开(公告)日:2015-12-22

    申请号:US13939061

    申请日:2013-07-10

    CPC classification number: G06F21/52

    Abstract: A method of increasing processing diversity on a computer system includes: loading a plurality of instruction streams, each of the plurality of instruction streams being equivalent; executing, in a context, a first stream of the plurality of instruction streams; stopping execution of the first stream at a first location of the first stream; and executing, in the context, a second stream of the plurality of instruction streams at a second location of the second stream, the second location corresponding to the first location of the first stream.

    Abstract translation: 一种增加计算机系统上的处理分集的方法包括:加载多个指令流,所述多个指令流中的每一个等效; 在上下文中执行所述多个指令流中的第一流; 在第一流的第一位置停止第一流的执行; 以及在所述上下文中,在所述第二流的第二位置处执行所述多个指令流中的第二流,所述第二位置对应于所述第一流的所述第一位置。

    Malware and tamper resistant computer architecture
    68.
    发明授权
    Malware and tamper resistant computer architecture 有权
    恶意软件和防篡改计算机体系结构

    公开(公告)号:US09208353B2

    公开(公告)日:2015-12-08

    申请号:US13766401

    申请日:2013-02-13

    CPC classification number: G06F21/71 G06F21/79 G06F2221/2107

    Abstract: Generally described herein are methods and systems for enhanced tamper and malware resistant computer architectures. A system for enhanced tamper and malware resistance can include a harvardizer configured to receive comingled instructions and data and produce separated instructions and data. A data memory can be configured to receive the separated data. An instruction memory that is physically separate from the data memory can be configured to receive the separated instructions. The system can include one or more computer processors that can be configured to execute the separated instructions and data. The system can include one or more encryptors or decryptors to help thwart injection based attacks.

    Abstract translation: 这里通常描述了用于增强篡改和防恶意软件的计算机体系结构的方法和系统。 用于增强篡改和恶意软件阻力的系统可以包括被配置为接收附带的指令和数据并产生分离的指令和数据的哈佛器。 可以将数据存储器配置为接收分离的数据。 物理上与数据存储器分离的指令存储器可以被配置为接收分离的指令。 该系统可以包括一个或多个可配置为执行分离的指令和数据的计算机处理器。 该系统可以包括一个或多个加密器或解密器,以帮助阻止基于注射的攻击。

    PROBABILISTIC CYBER THREAT RECOGNITION AND PREDICTION
    69.
    发明申请
    PROBABILISTIC CYBER THREAT RECOGNITION AND PREDICTION 有权
    可靠的网络威胁识别和预测

    公开(公告)号:US20150332054A1

    公开(公告)日:2015-11-19

    申请号:US14279869

    申请日:2014-05-16

    Abstract: Generally discussed herein are systems, apparatuses, or processes to recognize that a cyber threat exists or predict a future track of a cyber threat in a network. According to an example, a process for recognizing a cyber threat can include (1) determining a network layout of a network based on received network layout data, (2) receiving cyber sensor data indicating actions performed on the network, (3) calculating a first score associated with the cyber sensor data indicating that a cyber threat is present in the network by comparing a cyber threat profile of the cyber threat that details actions performed by the cyber threat to actions indicated by the cyber sensor data, (4) determining whether the calculated first score is greater than a specified threshold, or (5) determining that the cyber threat is present in response to determining the calculated first score is greater than the specified threshold.

    Abstract translation: 这里通常讨论的是识别网络威胁存在或预测网络中的网络威胁的未来轨迹的系统,装置或过程。 根据一个示例,用于识别网络威胁的过程可以包括:(1)基于所接收的网络布局数据来确定网络的网络布局;(2)接收指示在网络上执行的动作的网络传感器数据,(3) 与网络传感器数据相关联的第一个分数,指示网络威胁存在于网络中,将网络威胁的网络威胁概况与网络威胁所执行的动作进行比较,以及网络传感器数据所指示的动作;(4)确定是否 所计算的第一分数大于指定的阈值,或(5)响应于确定所计算的第一分数确定网络威胁存在大于指定的阈值。

    SYSTEM AND METHOD TO MERGE ENCRYPTED SIGNALS IN DISTRIBUTED COMMUNICATION SYSTEM
    70.
    发明申请
    SYSTEM AND METHOD TO MERGE ENCRYPTED SIGNALS IN DISTRIBUTED COMMUNICATION SYSTEM 有权
    在分布式通信系统中加密加密信号的系统和方法

    公开(公告)号:US20150249649A1

    公开(公告)日:2015-09-03

    申请号:US14194585

    申请日:2014-02-28

    Abstract: In a computer implemented method for data privacy in a distributed communication system including a plurality of client terminals, the method includes: receiving, from each of the plurality of client terminals, a group of key switch hints generated by said each of the client terminals, wherein each group of key switch hints include a key switch hint corresponding to each other one of the client terminals; receiving, from each of the client terminals, an encrypted data stream; switching each of the encrypted data streams using the key switch hints corresponding to said each other one of the client terminals to generate a respective switched data set for said each of the encrypted data streams, wherein each switched data set includes a plurality of encrypted data representations of said each of the encrypted data streams; and generating an encrypted output data stream for each of the client terminals using the switched data set for each encrypted data stream.

    Abstract translation: 在包括多个客户终端的分布式通信系统中的用于数据隐私的计算机实现方法中,所述方法包括:从所述多个客户终端中的每一个接收由所述每个所述客户终端生成的一组密钥交换机提示, 其中每组密钥交换机提示包括彼此对应的一个客户终端的密钥交换机提示; 从每个客户终端接收加密的数据流; 使用对应于彼此之一的客户端终端的密钥交换机提示来切换每个加密数据流,以生成针对所述每个加密数据流的相应交换数据集,其中每个交换数据集包括多个加密数据表示 的每个加密数据流; 以及使用针对每个加密数据流的切换数据集,为每个客户终端生成加密的输出数据流。

Patent Agency Ranking