Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Personalization of alerts based on network monitoring
XJ Wu, NJ Braun, JB Deaguero… - US Patent …, 2020 - Google Patents
Embodiments are directed to monitoring network traffic using network computers. A
monitoring engine may monitor network traffic associated with a plurality of entities in a …
monitoring engine may monitor network traffic associated with a plurality of entities in a …
Secure communication secret sharing
JA Rothstein, BT Higgins, BD Hatch - US Patent 9,338,147, 2016 - Google Patents
G06F2L/00(2013.01) Graham Jones PLLC G06F 2/14(2006.01) G06F II/00(2006.01)(57)
ABSTRACT G06F 2/56(2013.01) Embodiments are directed to sharing secure …
ABSTRACT G06F 2/56(2013.01) Embodiments are directed to sharing secure …
Managing session secrets for continuous packet capture systems
BT Higgins, CCH Tan, JA Rothstein - US Patent 10,476,673, 2019 - Google Patents
Embodiments are direct to monitoring communication between computers may be using
network monitoring com puters (NMCs). Network packets that are communicated between …
network monitoring com puters (NMCs). Network packets that are communicated between …
Inline secret sharing
BT Higgins, JA Rothstein - US Patent 9,967,292, 2018 - Google Patents
Embodiments are directed to monitoring communication between computers using network
monitoring computers (NMCs). NMCs identify a secure communication session established …
monitoring computers (NMCs). NMCs identify a secure communication session established …
Ranking alerts based on network monitoring
XJ Wu, NJ Braun, JB Deaguero… - US Patent …, 2021 - Google Patents
Embodiments are directed to monitoring network traffic. A monitoring engine may monitor
network traffic associated with a plurality of entities in networks to provide metrics. And …
network traffic associated with a plurality of entities in networks to provide metrics. And …
End-to-end authentication at the service layer using public keying mechanisms
VK Choyi, DN Seed, YC Shah, Q Ly… - US Patent …, 2018 - Google Patents
In a machine-to-machine/Internet-of-things environment, end-to-end authentication of
devices separated by multiple hops is achieved via direct or delegated/intermediated nego …
devices separated by multiple hops is achieved via direct or delegated/intermediated nego …
Device to device security using NAF key
(57) ABSTRACT A method, apparatus and computer program product are disclosed for
establishing secure off-network communica tions between first and second Secure Cellular …
establishing secure off-network communica tions between first and second Secure Cellular …
Secure communication secret sharing
JA Rothstein, BT Higgins, BD Hatch - US Patent 9,621,523, 2017 - Google Patents
5,787,237 A 7/1998 Reilly 2010/0268937 A1 10, 2010 Blom et al. 5,802,599 A 9, 1998
Cabrera et al. 2010/0316216 A1 12/2010 Fukushima et al. 5,835,726 A 11/1998 Shwed et …
Cabrera et al. 2010/0316216 A1 12/2010 Fukushima et al. 5,835,726 A 11/1998 Shwed et …
Automatic determination of user roles and asset types based on network monitoring
XJ Wu, BT Higgins, MKK Montague, PS Lee… - US Patent …, 2020 - Google Patents
Embodiments are directed to monitoring network traffic to determine users and assets based
on the network traffic. A user role model may assign a user role and provide a role …
on the network traffic. A user role model may assign a user role and provide a role …
Managing access control to closed subscriber groups
Systems and methodologies are described that facilitate man aging access control to Closed
Subscriber Groups (CSGs) in a Wireless communication environment. A user equipment …
Subscriber Groups (CSGs) in a Wireless communication environment. A user equipment …