Patent application number | Description | Published |
20080301448 | Security Against Corruption for Networked Storage - Systems and methods for security against corruption for networked storage are described. In one aspect, a destination device receives a linear combination of packets. The linear combination of packets represents digitally signed blocks of content and public information used to digitally sign segmented blocks of content. The destination device recombines the linear combination of packets to compute new valid signatures as linear combinations of received homomorphic digital signatures. The new valid signatures are for verifying by a requesting computing device recovering data associated with at least a subset of the linear combination of packets, integrity of the at least a subset. This provides the requesting node with security against corruption of data in networked storage. | 12-04-2008 |
20090287756 | Computing Modular Polynomials Modulo Large Primes - Systems and methods for computing modular polynomials modulo large primes are described. In one aspect, the systems and methods generate l-isogenous elliptic curves. A modular polynomial modulo a large prime p is then computed as a function of l-isogenous elliptic curves modulo p. | 11-19-2009 |
20090290714 | Protocol for Verifying Integrity of Remote Data - An exemplary method for verifying the integrity of remotely stored data includes providing a key; providing a fingerprint, the fingerprint generated using the key in a keyed cryptographic hash function as applied to data of known integrity; sending the key to a remote storage location that stores a copy of the data of known integrity; receiving a fingerprint from the remote storage location, the fingerprint generated using the key in a keyed cryptographic hash function as applied to the remotely stored copy of the data; and verifying the integrity of the remotely stored copy of the data based at least in part on comparing the provided fingerprint to the received fingerprint. Other exemplary methods, systems, etc., are also disclosed. | 11-26-2009 |
20090290715 | Security architecture for peer-to-peer storage system - An exemplary method includes receiving a request to register a peer in a peer-to-peer system; generating or selecting a transaction key for the peer; storing the transaction key in association with registration information for the peer; transmitting the transaction key to the peer and, in response to a request to perform a desired peer-to-peer transaction by another peer, generating a token, based at least in part on the transaction key. Such a token allows for secure transactions in a peer-to-peer system including remote storage of data and retrieval of remotely stored data. Other exemplary techniques are also disclosed including exemplary modules for a peer-to-peer server and peers in a peer-to-peer system. | 11-26-2009 |
20100082992 | Cryptographic Applications of Efficiently Evaluating Large Degree Isogenies - Techniques are disclosed for representing and evaluating large prime degree isogenies for use in cryptographic signature and encryption schemes. An isogeny of prime degree 1 may be represented as an ideal in the form (1, A*alpha+B), where 1 comprises the degree of a prime number, the prime number is split into integers a and b, and alpha is a known endomorphism. For a given degree 1, integers a and b define a unique isogeny, allowing the isogeny to be stored with 3 log(1) bits of information. Techniques are also disclosed to evaluate the isogeny at a given point by decomposing the isogeny into an integer and a plurality of smaller degree isogenies, evaluating the smaller degree isogenies at the point with traditional means, and multiplying the results of the evaluations together and with the integer. | 04-01-2010 |
20100088520 | PROTOCOL FOR DETERMINING AVAILABILITY OF PEERS IN A PEER-TO-PEER STORAGE SYSTEM - A method and system is provided for monitoring the availability of a peer in a P2P system that is used to provide remote storage or remote processing power. In one illustrative example, a recipient peer requests access to a service provisioned by another peer in a peer-to-peer network. The request may be a request to access a file or a file fragment that is being stored on the other peer. In order to make use of the accessed service, after receiving access to the service provisioned by the peer, the recipient peer needs to report to a central server that the service has been rendered. For instance, in some cases the file fragment accessed by the recipient peer may be encrypted, in which case the central server will send the recipient peer a decryption key after receiving the report that the service has been rendered. | 04-08-2010 |
20100174968 | HEIRARCHICAL ERASURE CODING - Arrangements are provided for efficient erasure coding of files to be distributed and later retrieved from a peer-to-peer network, where such files are broken up into many fragments and stored at peer systems. The arrangements further provide a routine to determine the probability that the file can be reconstructed. The arrangements further provide a method of performing the erasure coding in an optimized fashion, allowing fewer occurrences of disk seeks. | 07-08-2010 |
Patent application number | Description | Published |
20080301815 | Detecting Unauthorized Changes to Printed Documents - Systems and methods to detect unauthorized changes to a printed document are described. In one aspect, a digital signature of original content associated with electronic document is embedded into the original content to create a content signed document. The systems and methods use the embedded digital signature to automatically determine whether text-based content associated with a printout of the content signed document was changed from the original content associated with the electronic document. | 12-04-2008 |
20090222408 | DATA STORAGE STRUCTURE - Efficient data storage and retrieval (e.g., in terms of time and space requirements) is facilitated by implementing an indexing structure comprising an indexing array. That is, a functional relationship between elements of a source set and elements of a query result set can be stored in the indexing structure. This allows, for example, a query regarding whether an element is a member of a set (e.g., whether a particular website or Uniform Resource Locator (URL)) has been visited before) as well as a relationship between the member set and the query (e.g., the number of hyperlinks in the website the last time it was visited) to be resolved efficiently. | 09-03-2009 |
20110234594 | GRAPH CLUSTERING - Various embodiments provide techniques for graph clustering. In one or more embodiments, a participation graph is obtained that represents relationships between entities. An auxiliary graph is constructed based on the participation graph. The auxiliary graph may be constructed such that the auxiliary graph is less dense than the participation graph and is therefore computationally less complex to analyze. Clusters in the auxiliary graph are determined by solving an objective function defined for the auxiliary graph. Clusters determined for the auxiliary graph may then be utilized to ascertain clusters in the participation graph that solve a related objective function defined for the participation graph. | 09-29-2011 |
20110238490 | AUCTION FLIGHTING - Various embodiments provide techniques for auction flighting. In one or more embodiments, a control group and a test group are designated for participants who compete one to another in online auctions. An inclusive model may then be employed for testing of new conditions for auctions using the groups. In particular, multiple auctions can be conducted and/or simulated, such that control conditions are applied in auctions that do not include at least one member of the test group, and test conditions are applied in auctions having members from both the test group and the control group. A response to the test conditions can then be measured by analyzing behaviors of the participants in the auctions conducted with the control conditions in comparison to behaviors of participants in the auctions conducted with the test conditions. | 09-29-2011 |
20110246312 | ADVERTISEMENT INVENTORY MATCHING - Various embodiments provide techniques for advertisement inventory. In at least some embodiments, a scaled number of impressions can be matched to orders that have scaled impression goals. Impressions can be randomly selected from an offline traffic model and allocated to orders according to a matching algorithm until a number of impression defined by a scale factor is reached. This can occur by sampling the traffic model directly using the scale factor and/or by creating a scaled data set to which the matching algorithm can be applied. The matching algorithm can be configured to identify an order that is farthest away from being complete and then match the randomly selected impression to the identified order. If the scaled orders in the data set can be fulfilled using the scaled number of impressions, a conclusion is made that the original set of orders can be fulfilled using the original impressions. | 10-06-2011 |
20110251889 | INVENTORY CLUSTERING - Various embodiments provide techniques for inventory clustering. In one or more embodiments, a set of inventory to be processed is placed into an initial cluster. The inventory can be related to impressions for advertising that are defined by values for a set of attributes. Recursive division of the initial cluster is performed by selecting an attribute and deriving child clusters that are constrained by one or more values of the attributes in accordance with one or more clustering algorithms. The clustering algorithms are configured to derive an optimum number of clusters by repetitively generating smaller child clusters and measuring a cost associated with adding additional clusters. Additional child clusters can be formed in this manner until the measured cost to add more clusters outweighs a benefit of adding more clusters. | 10-13-2011 |
20110258045 | INVENTORY MANAGEMENT - Various embodiments provide techniques for inventory management. In one or more embodiments, a probabilistic model is constructed to represent an inventory of ad impressions available from a service provider. The probabilistic model can be based on a traffic model that describes historic interaction of clients with the service provider using various attributes that define the ad impressions. The probabilistic model provides a distribution of the attributes and relates the attributes one to another based on dependencies. When an order from an advertiser for ad impressions is booked by the service provider, the probabilistic model is updated to reflect an expected probabilistic decrease in the inventory of ad impressions. The updated probabilistic model can then be employed to determine whether the inventory of ad impressions is sufficient to book subsequent orders for ad impressions. | 10-20-2011 |
20150019204 | FEATURE COMPLETION IN COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |
20150019460 | ACTIVE LABELING FOR COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |
20150019461 | INTERACTIVE SEGMENT EXTRACTION IN COMPUTER-HUMAN INTERACTIVE LEARNING - A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization. | 01-15-2015 |