(12) Ulllted States Patent (10) Patent N0.: US 7,574,433 B2 Engel (45) Date of Patent: Aug

Total Page:16

File Type:pdf, Size:1020Kb

(12) Ulllted States Patent (10) Patent N0.: US 7,574,433 B2 Engel (45) Date of Patent: Aug US007574433B2 (12) Ulllted States Patent (10) Patent N0.: US 7,574,433 B2 Engel (45) Date of Patent: Aug. 11, 2009 (54) CLASSIFICATION-EXPANDED INDEXING 6,598,046 B1 * 7/2003 Goldberg et a1. ............. .. 707/5 AND RETRIEVAL OF CLASSIFIED 6,625,596 B1* 9/2003 Nunez ......................... .. 707/3 DOCUMENTS 6,711,585 B1 * 3/2004 Copperman et a1. .... .. 707/104.1 6,778,979 B2* 8/2004 Grefenstette et a1. ......... .. 707/3 75 _ 6,820,075 B2 * 11/2004 Shanahan et a1. ............ .. 707/3 ( ) Inventor‘ Alan Kent Engel’ vlnanova’ PA (Us) 6,928,425 B2 * 8/2005 Grefenstette et a1. .. .... .. 707/2 . _ . 7,031,961 B2 * 4/2006 Pitkow et a1. .. 707/4 (73) Asslgnee' Paterra’ Inc" Kern’ 1116’ TX (Us) 7,177,904 B1 * 2/2007 Mathur et a1. ............. .. 709/204 . 2002/0147738 A1 10/2002 R d ( * ) Not1ce: Subject‘ to any d1scla1mer, the term of this 2003/0229626 A1 12/2003 Nigair P211911t 15 extended Or adlusted under 35 2004/0177015 A1 9/2004 Galaietal. U.S.C. 154(b) by 566 days. FOREIGN PATENT DOCUMENTS (21) Appl' NO‘: 10/960’725 JP 2003-345950 A 12/2003 (22) Filed: Oct. 8, 2004 * Cited by examiner (65) Prior Publication Data Primary ExamineriShahid A Alam (74) Attorney, Agent, or Firm4Gianna Julian-Arnold; Miles US 2006/0242118 A1 Oct. 26 2006 - ’ & Stockbr1dge RC. (51) Int- Cl' 57 ABSTRACT G06F 17/30 (2006.01) ( ) (52) US. Cl. ............... .. 707/4; 707/3; 707/5; 707/ 104.1 Document Classi?cation systems are Valuable tools for 0f Classi?cation Search ................... .. Searching and retrieving Classi?ed documents but can be pro 707/5, 4, 1041; 709/ 201, 204; 715/209 hibitively complex and cumbersome for users. See application ?le for complete search history. _ A s stem for the indexin and retrieval of classi?ed docu (56) References Clted y g ments inserts keywords, titles or de?nitions of previously U.S. PATENT DOCUMENTS applied classi?cations into the document record and provides the resulting record to a search engine. Searchers are able to 5,765,176 A * 6/1998 Bloomberg . .. 715/514 retrieve documents by searching on keywords from the clas 5,835,087 A * 11/1998 Herzetal. 715/810 si?cation system Without looking up class coding. 6,038,560 A * 3/2000 Wical .......................... .. 707/5 RE36,653 E 4/2000 Heckelet a1. 6,105,022 A 8/2000 Takahashiet a1. 30 Claims, 12 Drawing Sheets P100 Load XML record from stream P101 Transform P102 Add class iitles P103 from database Convert to HTML P104himl and save to document store Last Record ? 151 US. Patent Aug. 11,2009 Sheet 1 0f 12 US 7,574,433 B2 401 EIEIIJD 110 200 402 100 403 FIG. 1 300 US. Patent Aug. 11,2009 Sheet 2 0f 12 US 7,574,433 B2 100 1:: z 110 DE! EID ‘cm-‘5T1 :3 ‘:1: 120 on an ? 140 151 EC) 132 EC) 133 FIG. 2 Typical Document Server Web Site US. Patent Aug. 11,2009 Sheet 4 0f 12 US 7,574,433 B2 U1ited Sates Patent Pppllcation 20040177088 Knd Cbde A1 Jeffrey, Joel Septenber 9, 2004 Wde-spectrumi nfornati on search engine Abstract Anethod and conputer programproduct for conparing docunents includes segnenting a iudgrrent natrix into a plurality of information sub-matrices VlhBfB each subrratrix has a plurality of classifications and a plurality of term; relevant to each classification; evaluating a relevance of each termof the plurality of terns vlith respect to each classification of each information subrratrix of the information subnatrices; calculating an information spectrumfor a first docunent based upon at least some of the plurality of terns; calculating an information spectrumfor a second docunent based upon at least sone of the plurality of terns; and identifying the second docunent as relevant to the first docunent based upon a conparison of the calculated information spectruns. Inventors: Jeffrey, Joel; (Vlileaton, IL) Cbrrespondence Fame and Address: FlS-l& ao-iomsm RC 3300 DNNRNBJ-ERHAZA MMEAMIS Ml 55402 LS Pesignee Nine and Pdress: l-B Technologies, lnc., a Glifornia corporation Serial N).: 800217 Series Code: 10 ?led: Mrch12, 2004 US OJrrent Class: 707/102 US Class at Publication: 707/102 lntern'l Class: (06F 017/30 FIG. 4 US. Patent Aug. 11,2009 Sheet 5 0f 12 US 7,574,433 B2 United Sates Patent Application 20040177088 HndQDde A1 Jeffrey, Joel Septenber 9, 2004 Wde-spectrumi nfornati on search engine Abstract Anethod and corrputer programproduct for conparing documents includes segnenting a judgnent natrix into a plurality of information sub-matrices vihere each subnatrix has a plurality of classifications and a pl urality of terns relevant to each classification; evaluating a relevance of each termof the plurality of terns viith respect to each classification of each infornation subnatrix of the information subnatrices; calculating an infornation spectrumfor a first docunent based upon at least sons of the plurality of terns; calculating an information spectrumfor a second docurrent based upon at least sone of the plurality of terns; and identifying the second docurrent as rel evant to the first document based upon a comparison of the calculated information spectruns. inventors: Jeffrey. Joel; (Wieaton, IL) Correspondence Name and Address: FlS-l& RCl-NIBCN RC 3300 DNNRNHJ-ERHAZA MNEAPOJS Ml 55402 LS Pssignee Name and Adress: H5 Teohnol ogies, Inc, a California corporation Serial no: 800217 Series Code: 10 Filed: March 12, 2004 US. OJrrent Class: 707/102 - Oass 707 mmmm DQTPBASENQFILEMNGQUXTASTRUUB - 100 DRTPBPSESJ-HACRDATASTRETLE - 102 @neratlng database or data structure (e.g., via user interface) US Oassat Publication: 707/102 lntern'l Class: GD6F 017/30 FIG. 5 US. Patent Aug. 11,2009 Sheet 6 0f 12 US 7,574,433 B2 U1ited Sates Patent Application 20040177088 Kind Code A1 Jeffrey, Joel Septenber 9, 2004 - - - _ - _ _ - - - - - - - - - - - - - - - - - _ - v - _ - - . - - - - - - - - - - - _ - - - - - _ - - - - - - - - ~ - - - - - - - _ - - - - - - - - - - - -_ Wde-spectrumi nfornati on search engine Abstract Anethod and conputer programproduct for conparing docunents includes segnenting a judgrrent matrix into a plurality of information sub-matrices vlhere each subnatrix has a plurality of classifications and a plurality of terns relevant to each classification; evaluating a relevance of each termof the plurality of terns Vtith respect to each classification of each information subnatrix of the information subnatrices; calculating an infornation spectrumfor a first docurrent based upon at least some of the plurality of terns; calculating an inforn‘ation spectrumfor a second docunent based upon at least sons of the plurality of terns; and identifying the second docunent as relevant to the first docun'ent based upon a conparison of the calculated infornation spectruns. inventors: Jeffrey, Joel; (Weaton, lL) Correspondence Name and Address: FlS-l & RO-PHZHN RC 3300 DNNHQLBJ-BRHAZA MMEAPOJS Ml 55402 LS Fssignee Nana and Pdress: H5 Technol ogies. Inc., a California corporation Serial no: 800217 Series Cbde: 10 ?led: March 12, 2004 FIG. 6 US. Patent Aug. 11,2009 Sheet 7 0f 12 US 7,574,433 B2 CODE TITLE 00028000000 APPAREL 60028001000 MISCELLANEOUS 00028455000 GUARD OR PROTECTOR 00028456000 Body cover FIG. 7 US. Patent Aug. 11,2009 Sheet 8 0f 12 US 7,574,433 B2 classid level code cdlsp title 1 0 (30028000000 Class 2 APPAREL 2 1 00028001000 1 MISCELLANEOUS 3 1 60028455000 455 GUARD OR PROTECTOR 4 2 00028456000 456 Body cover 5 3 (30028457000 457 Hazardous material body cover FIG. 8 a classid ancestroid 2 1 3 1 4 1 4 3 5 1 5 3 5 4 FIG. 8b US. Patent Aug. 11,2009 Sheet 9 0f 12 US 7,574,433 B2 P100 Load XML record from stream P101 Transform P102 Add class titles from database P103 P104 Save to document store 131 FIG. 9 US. Patent Aug. 11,2009 Sheet 10 0f 12 US 7,574,433 B2 Get subclass code from m_spDOM P103.1 Set append target to <uscs/> P103.2 Load class hierarchy for subclass (spGetSubclassHierarchy) P1 03'3 For each row in rowset P103.4 P1035 P1035 ucstree element with N0 Create/insert new same classid in target ? usctree element in classid sequence P103.7 Set append target Set append target to existing element to new element FIG. 10 US‘ Patent Aug- 11,2009 Sheet 11 0f 12 US 7,574,433 B2 P100 Load XML record P101 from stream Transform p102 Add class titles from database P103 Convert to HTML P104him| and save to document store P105 N0 r 151 Yes FIG. 11 US. Patent Aug. 11,2009 Sheet 12 0f 12 US 7,574,433 B2 P100 Load XML record P101 from stream Transform P1 ()2 P104 Save to document store P1 05 No 131 Yes US 7,574,433 B2 1 2 CLASSIFICATION-EXPANDED INDEXING As a result the advantages of classi?cation and indexing AND RETRIEVAL OF CLASSIFIED systems are beyond the grasp of more casual users and infor DOCUMENTS mation professionals. On the other hand, the rapid recent groWth of fulltext-base TECHNICAL FIELD patent retrieval services on the Internet has led lay persons and information professionals alike to rely increasingly on keyWord searching. While keyWord searching has its advan This invention relates to the indexing and retrieval of docu tages and is easy to use, variations in terminology can easily ments to Which classi?cation codes and schemes have been lead to missed documents. Moreover, the intellectual product applied and, in particular, relates to the indexing and retrieval embodied in the classi?cations applied to the documents is of patent documents. totally lost. In related art, D & B Duns Market Ident?ers database on BACKGROUND DIALOG (http://library.dialog.com/bluesheets/html/ bI05l6.html) provides for searching SIC descriptors as a It is standard practice for intellectual property authorities search ?eld.
Recommended publications
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Discontinued Browsers List
    Discontinued Browsers List Look back into history at the fallen windows of yesteryear. Welcome to the dead pool. We include both officially discontinued, as well as those that have not updated. If you are interested in browsers that still work, try our big browser list. All links open in new windows. 1. Abaco (discontinued) http://lab-fgb.com/abaco 2. Acoo (last updated 2009) http://www.acoobrowser.com 3. Amaya (discontinued 2013) https://www.w3.org/Amaya 4. AOL Explorer (discontinued 2006) https://www.aol.com 5. AMosaic (discontinued in 2006) No website 6. Arachne (last updated 2013) http://www.glennmcc.org 7. Arena (discontinued in 1998) https://www.w3.org/Arena 8. Ariadna (discontinued in 1998) http://www.ariadna.ru 9. Arora (discontinued in 2011) https://github.com/Arora/arora 10. AWeb (last updated 2001) http://www.amitrix.com/aweb.html 11. Baidu (discontinued 2019) https://liulanqi.baidu.com 12. Beamrise (last updated 2014) http://www.sien.com 13. Beonex Communicator (discontinued in 2004) https://www.beonex.com 14. BlackHawk (last updated 2015) http://www.netgate.sk/blackhawk 15. Bolt (discontinued 2011) No website 16. Browse3d (last updated 2005) http://www.browse3d.com 17. Browzar (last updated 2013) http://www.browzar.com 18. Camino (discontinued in 2013) http://caminobrowser.org 19. Classilla (last updated 2014) https://www.floodgap.com/software/classilla 20. CometBird (discontinued 2015) http://www.cometbird.com 21. Conkeror (last updated 2016) http://conkeror.org 22. Crazy Browser (last updated 2013) No website 23. Deepnet Explorer (discontinued in 2006) http://www.deepnetexplorer.com 24. Enigma (last updated 2012) No website 25.
    [Show full text]
  • What Are Kernel-Mode Rootkits?
    www.it-ebooks.info Hacking Exposed™ Malware & Rootkits Reviews “Accessible but not dumbed-down, this latest addition to the Hacking Exposed series is a stellar example of why this series remains one of the best-selling security franchises out there. System administrators and Average Joe computer users alike need to come to grips with the sophistication and stealth of modern malware, and this book calmly and clearly explains the threat.” —Brian Krebs, Reporter for The Washington Post and author of the Security Fix Blog “A harrowing guide to where the bad guys hide, and how you can find them.” —Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. “The authors tackle malware, a deep and diverse issue in computer security, with common terms and relevant examples. Malware is a cold deadly tool in hacking; the authors address it openly, showing its capabilities with direct technical insight. The result is a good read that moves quickly, filling in the gaps even for the knowledgeable reader.” —Christopher Jordan, VP, Threat Intelligence, McAfee; Principal Investigator to DHS Botnet Research “Remember the end-of-semester review sessions where the instructor would go over everything from the whole term in just enough detail so you would understand all the key points, but also leave you with enough references to dig deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A top-notch reference for novices and security professionals alike, this book provides just enough detail to explain the topics being presented, but not too much to dissuade those new to security.” —LTC Ron Dodge, U.S.
    [Show full text]
  • Web Design.” I Found Books on Everything from HTML to XML and from Web Graphics to Web Usability
    Free ebooks ==> www.ebook777.com Free ebooks ==> www.ebook777.com Web Design: A Beginner’s Guide Second Edition www.ebook777.com Free ebooks ==> www.ebook777.com About the Author Wendy Willard is a designer, consultant, writer, and educator who has been involved in web design for about 15 years. She is the author of HTML: A Beginner’s Guide, Fourth Edition, and other books. Wendy is a graduate of Art Center College of Design in Pasadena, California. About the Technical Editor Kathi McCracken-Dente is a user experience strategist with an expertise in designing for e-commerce, communities, and web applications. Before starting McCracken Design, a web design agency in Oakland, California, she was a designer at frog design, Addwater, and Intuit. Her clients include Yahoo!, Intuit, PowerReviews, and LeapFrog. She is a graduate of Duke University and Art Center College of Design. Free ebooks ==> www.ebook777.com Web Design: A Beginner’s Guide Second Edition Wendy Willard New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Free ebooks ==> www.ebook777.com Copyright © 2010 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-170135-8 MHID: 0-07-170135-4 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-170134-1, MHID: 0-07-170134-6.
    [Show full text]
  • Dc60 Java and Web Programming Dec 2014
    DC60 JAVA AND WEB PROGRAMMING DEC 2014 Q.2 a. What is Java Runtime Environment? Explain the key differences between C++ and Java. Q2. A) The Java Runtime Environment (JRE) is what you get when you download Java software. The JRE consists of the Java Virtual Machine (JVM), Java platform core classes, and supporting Java platform libraries. The JRE is the runtime portion of Java software, which is all you need to run it in your Web browser. When you download Java software, you only get what you need - no spyware, and no viruses. C++ Java Strongly influenced by C syntax, with Object- Strongly influenced by C++/C syntax. Oriented features added. Provides the Java Native Interface and Compatible with C source code, except for a recently Java Native Access as a way to directly few corner cases. call C/C++ code. Write once, run anywhere / everywhere (WORA / Write once, compile anywhere (WOCA). WORE). Allows procedural programming, functional Strongly encourages exclusive use of the object- programming, object-oriented programming, generic oriented programming paradigm. Includes support programming, and template metaprogramming. for generic programming and creation of scripting Favors a mix of paradigms. languages. Runs as native executable machine code for the Runs in a virtual machine. target instruction set(s). Provides object types and type names. Allows Is reflective, allowing metaprogramming and reflection through RTTI. dynamic code generation at runtime. Has multiple binary compatibility standards Has a single, OS- and compiler-independent (commonly Microsoft (for MSVC compiler) and binary compatibility standard, allowing runtime Itanium/GNU (for virtually all other compilers)). check of correctness of libraries.
    [Show full text]
  • A Reference Architecture for Web Browsers
    A Reference Architecture for Web Browsers Alan Grosskurth and Michael W. Godfrey School of Computer Science University of Waterloo Waterloo, ON N2L 3G1 Canada {agrossku,migod}@uwaterloo.ca Abstract The web browser is perhaps the most widely used soft- ware application in history and has evolved significantly A reference architecture for a domain captures the fun- over the past fifteen years; today, users run web browsers damental subsystems common to systems of that domain as on diverse types of hardware, from cell phones and tablet well as the relationships between these subsystems. Hav- PCs to regular desktop computers. A reference architec- ing a reference architecture available can aid both during ture for web browsers can help implementors to understand maintenance and at design time: it can improve under- trade-offs when designing new systems, and can also assist standing of a given system, it can aid in analyzing trade- maintainers in understanding legacy code. offs between different design options, and it can serve as In this paper, we present a reference architecture for a template for designing new systems and re-engineering web browsers that has been derived from the source code existing ones. In this paper, we examine the history of the of two existing open source systems and validate our find- web browser domain and identify several underlying phe- ings against two additional systems. We explain how the nomena that have contributed to its evolution. We develop evolutionary history of the web browser domain has influ- a reference architecture for web browsers based on two enced this reference architecture, and we identify underly- well known open source implementations, and we validate ing phenomena that can help to explain current trends.
    [Show full text]
  • HTML: a Beginner’S Guide
    HTML: A Beginner’s Guide Fourth Edition About the Author Wendy Willard is a freelance consultant offering design and art direction services to clients. She also teaches and writes on these topics, and is the author of several other books including Web Design: A Beginner’s Guide (also published by McGraw-Hill). She holds a degree in Illustration from Art Center College of Design in Pasadena, California, where she first learned HTML in 1995. Wendy enjoys all aspects of digital design, reading, cooking, and anything related to the Web. She lives and works in Maryland with her husband, Wyeth, and their two daughters. About the Technical Editor Todd Meister has been developing and using Microsoft technologies for over ten years. He’s been a technical editor on over 50 titles ranging from SQL Server to the .NET Framework. Besides serving as a technical editor for titles, he is an assistant director for Computing Services at Ball State University in Muncie, Indiana. He lives in central Indiana with his wife, Kimberly, and their four remarkable children. HTML: A Beginner’s Guide Fourth Edition Wendy Willard New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2009 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-161144-2 MHID: 0-07-161144-4 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-161143-5, MHID: 0-07-161143-6.
    [Show full text]
  • Shake the Microsoft Habit Column by Jim Justen
    Shake the Microsoft Habit Column By Jim Justen icrosoft Internet Explorer (IE) is MOZILLA designers their artistic vision. Still, there are the Web browser of choice for well times when you simply cannot view a page if Mover 90%1 of desktop computer Netscape has many virtues and is an obvi- using Opera as your browser. users, and chances are, it’s on your computer as ous alternative browser with many fans. Alas, The other shortcoming of Opera is the $39 well. But is it truly chosen, or is it simply there Netscape as a commercial product has largely price tag. It’s a tough sell when so many as a result of ubiquity and Microsoft’s marketing ‘lost the war’.2 Nevertheless, Netscape’s tech- browsers are free, as Microsoft has correctly practices? I’ll leave that for the courts to decide. nology lives on in the parallel open-source surmised. But for heavy Web users, it may be Still, it is pre-installed on most windows PCs, browser “Mozilla.” A large, dedicated group worth the price. Opera may be had for free if and many non-technical users are literally of volunteer programmers soldier on with the you are willing to accept an unobtrusive ad- unaware of available alternatives. Even profes- free, open-source browser, adding features far banner display. sionals use it simply because, as climber George beyond those of any commercial product. Returning to the positives, Opera has excellent Mallory said of Mount Everest, “It’s there.” Mozilla is a complete suite of Internet utili- cookie and privacy control, terrific multi-language Is Microsoft’s browser the superior product? ties; mail, chat and a page editor are among its support and good Web kiosk and lockdown Although the current version of Internet Explorer elements.
    [Show full text]
  • Linkman PDF Manual
    Outertech Linkman Linkman is a bookmark management solution which supports 10 different browsers and integrates with Firefox, Internet Explorer and Maxthon. Linkman calls upon many powerful features that replace the browser's native URL management and allow to browse faster and more efficiently. To give you a better impression a Linkman tutorial video can be watched at http://linkmanvideo.outertech.com You can choose between two editions. Linkman Lite (Freeware) http://linkmanlite.outertech.com Linkman Lite is free for private non-commercial use as well as for use in charity organizations and educational use. Private use is only when used by individuals at home on their private PC. Educational use is by students for education in school or university. Linkman Pro ($25 | EUR19 for single computer license) http://linkmanpro.outertech.com This edition is intended for the professional user. Linkman Pro contains all features of Linkman Lite. In addition these abilities are included: * Synchronize links between two (or more) computers * Ability to check URLs for dead links, intelligent (only major) content changes, and page movements * Add all links on a single webpage * Improved keyword features (e.g. Keyword List) * Replace feature * Improved Database backup * Retrieve URL meta tags * Editable Export Templates (XML, TSV...) with UTF8 support * Optional installation on USB sticks for mobile usage Linkman 3 Table of Content Foreword 0 Part I Introduction 7 1 .O...v..e...r.v..i.e...w.............................................................................................................................. 7 2 .W...h...a..t.'.s.. .n..e..w............................................................................................................................ 9 3 ...O...t.h..e...r. .s..o..f..t.w...a..r.e................................................................................................................... 21 Part II Frequently Asked Questions 23 Part III Tutorial 27 1 ...F..i.r..s..t.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 7,574.433 B2 Engel (45) Date of Patent: Aug
    US007574.433B2 (12) United States Patent (10) Patent No.: US 7,574.433 B2 Engel (45) Date of Patent: Aug. 11, 2009 (54) CLASSIFICATION-EXPANDED INDEXING 6,598,046 B1* 7/2003 Goldberg et al. ............... 707/5 AND RETRIEVAL OF CLASSIFIED 6,625,596 B1 9/2003 Nunez ........................... 707/3 DOCUMENTS 6,711,585 B1* 3/2004 Copperman et al. ...... TO7 104.1 6,778,979 B2 * 8/2004 Grefenstette et al. ........... 707/3 (75)75 Inventor: Alan Kent Engel, Villanova, PA (US) 6,928,4256,820,075 B2 * 1 8/20051/2004 GrefenstetteShanahan et al.et al............... ........... 707/2707/3 7,031,961 B2 * 4/2006 Pitkow et al. .................. 7O7/4 (73) Assignee: Paterra, Inc., Kerrville, TX (US) 7, 177,904 B1* 2/2007 Mathur et al. ............... TO9.204 2002/0147738 A1 10, 2002 Read (*) Notice: Subject to any disclaimer, the term of this 2003,0229626 A1 12/2003 s patent is extended or adjusted under 35 2004/01770.15 A1 9, 2004 Galai et al. U.S.C. 154(b) by 566 days. FOREIGN PATENT DOCUMENTS (21) Appl. No.: 10/960,725 JP 2003-345950 A 12/2003 (22) Filed: Oct. 8, 2004 * cited by examiner (65) Prior Publication Data Primary Examiner Shahid A. Alam (74) Attorney, Agent, or Firm Gianna Julian-Arnold; Miles US 2006/0242118A1 Oct. 26, 2006 & Stockbridge P.C. (51) Int. Cl. 57 ABSTRACT G06F 7/30 (2006.01) (57) (52) U.S. Cl. ................. 707/4; 707/3; 707/5; 707/104.1 Document classification systems are valuable tools for (58) Field of Classification Search ....................
    [Show full text]
  • SCAN 31 the PROJECT HONEYNET Dophine V. Britanico
    SCAN 31 THE PROJECT HONEYNET http://www.honeynet.org Dophine V. Britanico INFOSEC Technical Document April 28,2004 :. CopyLeft (c) 2004 Dophine Britanico :. [email protected] Acknowledgment This work was prepared in response to Project Honeynet Challenge 31. The findings, tools and observation discuss in this paper is published for the general interest of the Computer Security Community and It was intended for highly technical audience, Some information maybe incorrect, out-dated, obscured, and all false. Typographical errors are all mine. No pixels were damage during the documentation and preparation of this technical document. TO GOD AND TO MY LOVING DAUGTHERS. Challenge Overview This month's challenge is to analyze web server log files looking for signs of abuse. The Honeypots: Monitoring and Forensics Project deployed a specially configured Apache web server, designed specifically for use as a honeypot open proxy server or ProxyPot. Questions 1. How do you think the attackers found the honeyproxy? It was quite probable that it was discovered by a proxy hunter. 2. What different types of attacks can you identify? This where attacks that’s generated most noise on the audit_log and catch my attention. 2.1 Probing of exploitable server using Automated scanner like Nessus looking for holes like IIS Unicode Directory Traversal exploit, It was also possible that the attacker used Proxy scanner, and Open SSL scanner. 2.2 Scan Open E-Mail relay gateway, probably to be used later by the attacker to spoof e-mail or to be utilized in SPAM. 2.3 Brute force login name and password of sites such as yahoo.com, icq.com, microsoft, mail.sina.com and etc.
    [Show full text]
  • ஜ Idm Crack Tehparadox ஜ Скачать
    ▬▬▬▬▬▬▬ஜ Idm crack tehparadox ஜ▬▬▬▬▬▬▬ Скачать: ➤ Idm crack tehparadox Download: ➤ Idm crack tehparadox ▬▬▬▬▬▬▬ஜ Idm crack tehparadox ஜ▬▬▬▬▬▬▬ . Idm crack tehparadox No idm crack tehparadox of updating etc. Ссылки на загрузку доступны без регистрации, а скорость зависит от вашего модема. Программа имеет многоязычный интерфейс, для переключения на русскую версию загляните в меню View. Internet Download Manager will resume unfinished download from the place where they left off. И грудинсофт распознаёт crack как угрозу. Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. Он удобен тем, что вы можете в любое время прервать загрузку или же наоборот, поставить загрузку на ночь, пока переносятся файлы. Thus IDM can access many Internet and proxy servers using login name and password. So here we are with this awesome fix- Internet Download Manager Crack. Progressive downloading with quotas feature. You can download Audio and Video files from any browser, some popular browsers are Chrome, Internet Explorer, Opera, Safari and Firefox. Then run the IDM Universal Crack and follow above steps from step 3. IDM supports HTTP, FTP, HTTPS and MMS protocols. Internet Download Manager has been tested with the following browsers: Internet Explorer, MSN Explorer, AOL, Netscape Communicator, Netscape 6, Netscape 7, Mozilla, Mozilla Firefox, Mozilla Firebird, Opera, NetCaptor, UltraBrowser, Slim Browser, Idm crack tehparadox Browser, MyIE2, Optimal Desktop, Ace Idm crack tehparadox, Advanced Browser, 27 Tools-in-1 Wichio Browser, WindowSurfer, 550 Access Browser, FineBrowser Freeware, Kopassa Browser, Fast Browser Pro, Enigma Browser, GoSuRF, K-Meleon, Smart Explorer, The Off By One Web Browser, Smartalec Voyager, CrystalPort AppCapture, The Family Browser, XANA Web Browser, Bluto, AutoSurf, 32bit Web Browser, BrowseMan, WrestlingBrowser, Eminem Browser, UltraBrowser, Cygsoft LDAP Browser, and Net M nager.
    [Show full text]