Patent application number | Description | Published |
20130080861 | ERASURE CODING SCHEME FOR DEADLINES - Error correction coding for streaming communication is provided. A streaming problem is modeled as a non-multicast network problem with a nested receiver structure. Each packet in the streaming problem corresponds to a link, and each deadline in the streaming problem corresponds to a receiver in the non-multicast network problem. For the non-multicast network problem, content to be transmitted in multiple packets to multiple receivers is obtained. Each of the receivers is required to decode specific independent messages from the content, at given time steps, and has access to a subset of the content received by another receiver. The content is allocated into multiple packets to be transmitted on multiple links. No coding occurs across information demanded by different receivers. A capacity region defines a set of information rate vectors that can be communicated to the receivers successfully. A rate vector is successfully communicated if it complies with various inequalities. | 03-28-2013 |
20130259235 | KEY AGREEMENT IN WIRELESS NETWORKS WITH ACTIVE ADVERSARIES - A network and related methods for transmitting processes in a network secretly and securely is described. The network use keys, through path-key establishment and a key pool bootstrapping, to ensure that packets are transmitted and received properly and secretly in the presence of one or more adversarial nodes. | 10-03-2013 |
20130297990 | DISTRIBUTED REED-SOLOMON CODES FOR SIMPLE MULTIPLE ACCESS NETWORKS - A computer-based distributed error correction scheme with an efficient decoding algorithm is disclosed. The efficiency of the corresponding decoding algorithm, based on standard single source Reed-Solomon error correcting codes, makes the practical employment of the DECC feasible. Various implementation examples are also provided. | 11-07-2013 |
20150288516 | KEY AGREEMENT IN WIRELESS NETWORKS WITH ACTIVE ADVERSARIES - A network and related methods for transmitting processes in a network secretly and securely is described. The network use keys, through path-key establishment and a key pool bootstrapping, to ensure that packets are transmitted and received properly and secretly in the presence of one or more adversarial nodes. | 10-08-2015 |
20160036563 | DISTRIBUTED REED-SOLOMON CODES FOR SIMPLE MULTIPLE ACCESS NETWORKS - A computer-based distributed error correction scheme with an efficient decoding algorithm is disclosed. The efficiency of the corresponding decoding algorithm, based on standard single source Reed-Solomon error correcting codes, makes the practical employment of the DECC feasible. Various implementation examples are also provided. | 02-04-2016 |
Patent application number | Description | Published |
20130174257 | Active Defense Method on The Basis of Cloud Security - The present invention relates to an active defense method based on cloud security comprising: a client collecting and sending a program behavior launched by a program thereon and/or a program feature of the program launching the program behavior to a server; with respect to the program feature and/or the program behavior sent by the client, the server performing an analysis and comparison in its database, making a determination on the program based on the comparison result, and feeding back to the client; based on the feedback determination result, the client deciding whether to intercept the program behavior, terminate execution of the program and/or clean up the program, and restore the system environment. The invention introduces a cloud security architecture, and employs a behavior feature based on active defense to search and kill a malicious program, thereby ensuring network security. | 07-04-2013 |
20130185797 | WHITELIST-BASED INSPECTION METHOD FOR MALICIOUS PROCESS - A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective. | 07-18-2013 |
20130291111 | Method and Device for Program Identification Based on Machine Learning - The invention discloses a method and device for programidentification based on machine learning. The method comprises: analyzing an inputted unknown program, and extracting a feature of the unknown program; coarsely classifying the unknown program according to the extracted feature; judging by inputting the unknown program into a corresponding decision-making machine generated by training according to a result of the coarse classification; and outputting an identification result of the unknown program, wherein the identification result is a malicious program or a non-malicious program. The embodiments of the invention adopt the machine learning technology, achieve the decision-making machine for identifying a malicious program by analyzing a large number of program samples, and can save a lot of manpower and improve the identification efficiency for a malicious program by using the decision-making machine; and furthermore, can find an inherent law of programs based on data mining for massive programs, prevent a malicious program that has not happened and make it difficult for a malicious program to avoid killing. | 10-31-2013 |
20130298121 | Method for Isolated Use of Browser - The present invention provides a method for isolated use of browser comprising: establishing a virtual environment in a user's computer system by a browser; arranging content loaded by the browser in the virtual environment; processing operation results in the virtual environment. | 11-07-2013 |
20140236902 | User Data Backup Method and Apparatus - The invention discloses a user data backup method, comprising: searching a local computer of a user for an editable document; according to a search result, marking the editable document as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Also disclosed is another user data backup method, comprising: monitoring a removable storage device connection status of a local computer of a user; if it is detected that a removable storage device is connected to the local computer, marking data in the device as data with backup requirement; and backing up the data with backup requirement in a storage device on a network side. Further disclosed is yet another user data backup method, comprising: monitoring a resource class temporary file generated in a local system; uploading the resource class temporary file to a storage device on a network side; and according to an access requirement of the local system, providing the local system with download of the uploaded resource class temporary file. | 08-21-2014 |
20150205960 | METHOD OF DETECTING A MALWARE BASED ON A WHITE LIST - A method of detecting a malware based on a white list comprises: receiving on a server side a program feature and/or a program behavior of a program to be detected sent from a client side; comparing the program feature and/or the program behavior of the detected program with legitimate program features and/or legitimate program behaviors stored in a white list; obtaining a legitimacy information of the unknown program based on the comparison result and feeding this back to the client side. In the invention, a legitimate program is determined by using a white list, thereby determining an illegitimate program excluded from the white list as a malware, which performs a determination and detecting and removing of a malware from another perspective. | 07-23-2015 |