Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

91 results about "Event level" patented technology

Automatic analysis of security related incidents in computer networks

Solutions for responding to security-related incidents in a computer network, including a security server, and a client-side arrangement. The security server includes an event collection module communicatively coupled to the computer network, an event analysis module operatively coupled to the event collection module, and a solution module operatively coupled to the event analysis module. The event collection module is configured to obtain incident-related information that includes event-level information from at least one client computer of the plurality of client computers, the incident-related information being associated with at least a first incident which was detected by that at least one client computer and provided to the event collection module in response to that detection. The event analysis module is configured to reconstruct at least one chain of events causally related to the first incident and indicative of a root cause of the first incident based on the incident-related information. The solution module is configured to formulate at least one recommendation for use by the at least one client computer, the at least one recommendation being based on the at least one chain of events, and including corrective / preventive action particularized for responding to the first incident.
Owner:AO KASPERSKY LAB

System and method enabling multiple processes to efficiently log events

A system and method for enabling multiple processes to efficiently log events is described. A client executable module that needs to log an event may interface with a module or component referred to as a “client-side logging component”, passing various types of information regarding the event, such as an associated event level, one or more event associated event categories, an informational message, etc. The client-side logging component may maintain event logging criteria specifying which types of events should be logged. If the event should be logged, the client-side logging component may queue the event information and return execution control the client module. The event information may then be asynchronously retrieved from the event queue and sent to a server-side logging component. The server-side logging component may persistently log the event information in any of various ways, e.g., by storing it in a file, a database, etc. Processes running on multiple computers may call the server-side logging component to log events, via a client-side logging component instance associated with the process. A logging administration tool may be utilized in order to set event logging criteria. In response to being configured with new event logging criteria information, the server-side logging component may automatically propagate the logging criteria information to each of the client-side logging components. The client-side logging components may then being using the new logging criteria, dynamically changing the filtering of events that are sent to the server-side logging component.
Owner:KOUGIOURIS PANAGIOTIS +1

Automatic analysis of security related incidents in computer networks

ActiveUS20130055399A1Reduce time spent on investigatingEasy to detectMemory loss protectionError detection/correctionEvent levelChain of events
Solutions for responding to security-related incidents in a computer network, including a security server, and a client-side arrangement. The security server includes an event collection module communicatively coupled to the computer network, an event analysis module operatively coupled to the event collection module, and a solution module operatively coupled to the event analysis module. The event collection module is configured to obtain incident-related information that includes event-level information from at least one client computer of the plurality of client computers, the incident-related information being associated with at least a first incident which was detected by that at least one client computer and provided to the event collection module in response to that detection. The event analysis module is configured to reconstruct at least one chain of events causally related to the first incident and indicative of a root cause of the first incident based on the incident-related information. The solution module is configured to formulate at least one recommendation for use by the at least one client computer, the at least one recommendation being based on the at least one chain of events, and including corrective/preventive action particularized for responding to the first incident.
Owner:AO KASPERSKY LAB

Method and apparatus for assigning value to an item donated to an on-line charitable auction or fund raising event

InactiveUS20050246265A1Easy to watchEnhanced email messagingFinanceCommerceCredit cardEvent level
The present invention discloses methods, systems, and program code that enable a nonprofit organization to manage its fundraising activities online. Disclosed are methods and systems for providing online hosting of fundraising auctions, and auction services such as maintaining donor/bidder registries, bid tracking, processing credit cards, and auction closeout activities. Also disclosed are a plurality of on-line, web-based tools, including tools for: 1) building a customized homepage reflecting the look and feel of the nonprofit organization; 2) building a customized catalog that allows for easy addition of items and pictures; and 3) enhanced email messaging that lets a nonprofit organization reach its constituents. According to the invention, the system enables an auction administrator to enable, at the global event level or on a per item basis, the ability for donors and/or buyers in an auction to assign either the value of an item or the final selling price of an item to a specific chapter of an organization or to a specific organization when multiple organizations are participating in a common auction. Alternatively, a buyer or donor can specify a fraction or percentage of the value or selling price such that multiple causes, chapters, or organizations may receive partial credit on the donation or sale of an item.
Owner:C-MARKET

Cloud computing cluster mixing job scheduling method and device, server and storage device

The invention discloses a cloud computing cluster hybrid job scheduling method and device, a server and a storage device, and the method comprises: analyzing the historical operation log data of a plurality of types of loads obtained in advance, and determining the maximum resource value needed during the operation of each load type; simulating and deploying multiple load types to a server in a mixed manner based on the maximum resource value, and obtaining the occurrence frequency of a hardware event in each mixed deployment mode; calculating a recommendation score of each hybrid deployment mode based on the occurrence frequency of the hardware event; when a job scheduling request is received, confirming required resources meeting the job scheduling request; screening out a server list conforming to the required resources, and determining a target hybrid deployment mode with the highest recommendation score from the server list; and performing system scheduling on the job scheduling request according to the target hybrid deployment mode. The job scheduling request is subjected to double-layer hybrid deployment on the resource level and the hardware event level, so that the overallresource utilization rate of the cloud server is improved.
Owner:SHENZHEN INST OF ADVANCED TECH

Power grid fault event level automatic identification method

The invention belongs to the power grid fault identification field and relates to a power grid fault event level automatic identification method. The method comprises the following steps: S1, fault source information in an alarm system database is regularly read; S2, switch information is parsed, so that corresponding switch associated equipment can be obtained; S3, a topologic model determines whether devices undergo voltage loss, if no devices undergo voltage loss, no events are generated; if voltage loss occurs, the topologic model traces lower-level voltage-loss devices; S4, all voltage-loss devices are put into statistics, and voltage-loss stations are obtained through analysis; S5, the real-time load of 10kv bus-bars in the voltage-loss devices and user data are put into statistics;and S6, calculation is performed according to accident event judgment rules, and the level of a current accident event is generated and displayed. With the method adopted, fault risk information can be automatically generated; high efficiency can be realized; time can be saved for a dispatcher; the dispatcher can obtain risk reference information immediately; and automatic calculation can be realized, and therefore, manual calculation errors can be avoided, and a misjudgment rate can be reduced.
Owner:广东电网有限责任公司惠州供电局

Linkage method for firewall and intrusion-detection system

The invention relates to a linkage method for a firewall and intrusion-detection system, and the method is used for network protection and is characterized by comprising the following steps: encrypting and transmitting the alarm information generated by the intrusion-detection system to a forestage information receiver and then sending the alarm information to a preprocessor after decrypting and authenticating the alarm information by the forestage information receiver; performing the preprocessing of extracting and cleaning the information record by the preprocessor and then sending to an analyzer; sending an order to a decider by the analyzer if the acquired safety event level exceeds a preset threshold value, otherwise, sending an analyzed result to a relevance analyzer; performing the relevance analysis by the relevance analyzer and then sending a result to a risk evaluator; performing the risk evaluation on the current network state by the risk evaluator and then sending the acquired risk level of the current network and the network running state parameters to the decider; sending the linked specific information to a backstage information receiver by the decider, performing the related treatment and then sending the result to the firewall for implementing linkage; and centrally auditing an intrusion-detection log of the forestage information receiver and a firewall log of the backstage information receiver and then sending to the relevance analyzer.
Owner:NORTHEAST DIANLI UNIVERSITY

Alarm message pushing method and device, equipment and storage medium

The invention discloses an alarm message pushing method and device, equipment and a storage medium. The method comprises the following steps: acquiring parameter data of current equipment; judging whether the parameter data of the current equipment meets a set event rule, if so, triggering an alarm event associated with the current event rule, and executing an event action; wherein the event action comprises the steps of selecting a message template, and sending a message according to the message content pointed by the message template and a specified alarm object. According to the invention, the data cloud storage is operated through the equipment, the abnormal condition of the data is determined according to the rule definition of the event, the alarm information is sent to the specific receiving end and the receiving object according to the message preset template, the event level and the determination strategy are pre-defined for the abnormal condition of the data, and different terminals are selected for sending. Meanwhile, the user object permission is formulated, so that the message can be sent to a specific object, and the problems that the content viewing permission of the existing alarm information is not graded, and the sending object and the sending form are single are solved.
Owner:佛山技研智联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products