KR101790566B1 - Method and apparatus of providing feedback for information searching - Google Patents
Method and apparatus of providing feedback for information searching Download PDFInfo
- Publication number
- KR101790566B1 KR101790566B1 KR1020160007212A KR20160007212A KR101790566B1 KR 101790566 B1 KR101790566 B1 KR 101790566B1 KR 1020160007212 A KR1020160007212 A KR 1020160007212A KR 20160007212 A KR20160007212 A KR 20160007212A KR 101790566 B1 KR101790566 B1 KR 101790566B1
- Authority
- KR
- South Korea
- Prior art keywords
- information
- feedback
- client
- request
- inquiry
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000004044 response Effects 0.000 claims abstract description 36
- 238000004891 communication Methods 0.000 claims description 18
- 238000012545 processing Methods 0.000 description 74
- 238000009499 grossing Methods 0.000 description 39
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 208000019901 Anxiety disease Diseases 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000036506 anxiety Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H04L67/26—
Abstract
A method and apparatus are provided for providing feedback to an information query. The server receives a request for information query from the client and sends a response to the request to the client. In addition, the server obtains data associated with the information for which the query is requested, and uses the acquired data to generate additional results for the query. The server provides feedback, including additional results, to the client or other device associated with the user of the client.
Description
The following embodiments relate to a method and apparatus for an information query service, and more particularly to a method and apparatus for providing feedback on information query.
The information inquiry service provides the result of the information inquiry about the request of the information inquiry of the user. When the user 's client sends a request for information inquiry, the server performs an inquiry on the information and provides the result of the inquiry to the client.
In general, the investigation of information is based on existing known information. Thus, before a user requests an information query and the server generates a result for the information query request, only the information that the server has already acquired or can acquire can be included in the results of the search.
On the other hand, according to the attribute of the object of inquiry, there is no or little information related to the object before a specific point in time, and thereafter, a large amount of information is generated or important information is generated in relation to the object. For example, when smishing occurs over the Internet, information on smsing is not gathered initially, and a large amount of information can be collected while a large number of victims are generated. In such a case, information about the smsing may not be provided to the users who requested the information search before the specific point in time when the information collection is performed.
Therefore, even if the result of the information inquiry is once provided for the request of the information inquiry of the user, a technique of informing the user of the information further related to the request is required.
One embodiment may provide an apparatus and method for providing feedback to a user at a later time even when the result of the inquiry is not present at the time of inquiry of the information.
One embodiment can provide an apparatus and method for improving the quality of an information inquiry service by providing feedback to a user at a later time.
A method comprising: receiving, at a party, a request for an inquiry of information from a client, performed by a server; Sending a response to the request to the client; Storing data required for feedback on the request; Obtaining data related to the information for which the inquiry is requested; Using the data to generate additional results for the query; And providing feedback comprising an additional result to the client or another device associated with a user of the client.
The method of providing feedback for the information inquiry may further include performing the inquiry.
The response may provide feedback to an information query that includes the result of the query.
If the result of the query is not present, the response may indicate that the result does not exist.
The method of providing feedback for the information inquiry may further include determining whether the feedback is required for the request.
The step of generating the additional result and the step of providing the feedback may be performed when it is determined that the feedback is necessary.
If the result of the inquiry does not exist, it can be determined that the feedback is necessary for the request, and if the result of the inquiry is present, it can be determined that the feedback is not required for the request.
If the information is related to phishing or spamming, it may be determined that the feedback is needed for the request.
It may be determined that the feedback is required for the request when the users having the predetermined reference value or more commonly request the inquiry of the information.
It may be determined that the feedback is required for the request if the request explicitly requests the feedback.
The data required for the feedback may include data required to specify the client in the network.
The step of providing the feedback may include transmitting a push request of the feedback to the push server.
The feedback may be sent to the client or the other device via the push server.
The feedback may be transmitted to the client or the other device through a service provided by the push server.
The service provided by the push server may be different from the service used by the server to provide the response to the client.
Wherein the server provides feedback to an information inquiry that provides the user with the feedback related to the information in the future, even if the result of the inquiry does not exist at the time of the request.
The inquiry object may be a character received by the user or an application installed by the user.
A communication unit, on the other side, for receiving a request for inquiring information from a client and transmitting a response to the request to the client, the communication being performed by the server; And a processing unit for obtaining data related to the information for which the inquiry is requested and using the data to generate additional results for the inquiry,
The communication unit provides feedback to an information inquiry that provides feedback including the additional result to the client or another device associated with the user of the client.
In addition, there is further provided another method, apparatus, system for implementing the invention and a computer readable recording medium for recording a computer program for executing the method.
There is provided an apparatus and method for providing feedback to a user at a later time even when the result of the inquiry is not present at the time of inquiry of information inquiry.
There is provided an apparatus and method for improving the quality of an information inquiry service by providing feedback to a user at a later time.
1 shows a configuration of an information inquiry system according to an example.
2 is a configuration diagram of a server according to an example.
3 is a flow diagram of a method of providing feedback in accordance with one embodiment.
4 is a flow diagram of a method of providing feedback using a push server in accordance with one embodiment.
FIG. 5 illustrates a method of providing a request for inquiry of information about a smearing character according to an example and a response to the request.
Figure 6 illustrates a method for providing feedback on smearing characters according to an example.
Figure 7 illustrates information stored in a feedback database according to an example.
The following detailed description of exemplary embodiments refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments. These embodiments are described in sufficient detail to enable those skilled in the art to practice the embodiments. It should be understood that the various embodiments are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with an embodiment. It is also to be understood that the location or arrangement of the individual components within each disclosed embodiment may be varied without departing from the spirit and scope of the embodiments. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the exemplary embodiments is to be limited only by the appended claims, along with the full scope of equivalents to which such claims are entitled, if properly explained.
In the drawings, like reference numerals refer to the same or similar functions throughout the several views. The shape and size of the elements in the figures may be exaggerated for clarity.
The terms used in the examples are intended to illustrate the embodiments and are not intended to limit the invention. In the examples, the singular includes the plural unless otherwise stated in the specification. It is noted that the terms "comprises" and / or "comprising" used in the specification are intended to be inclusive in a manner similar to the components, steps, operations, and / And that additional configurations may be encompassed within the scope of the embodiments of the exemplary embodiments or the technical ideas of the exemplary embodiments. When it is mentioned that a component is "connected" or "connected" to another component, the two components may be directly connected or connected to each other, It is to be understood that other components may be present in the middle of the components.
The terms first and second, etc. may be used to describe various components, but the components should not be limited by the terms above. The above terms are used to distinguish one component from another. For example, without departing from the scope of the right, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component.
In addition, the components shown in the embodiments are shown independently to represent different characteristic functions, which does not mean that each component is composed of separate hardware or one software constituent unit. That is, each component is listed as each component for convenience of explanation. For example, at least two of the components may be combined into a single component. Also, one component can be divided into a plurality of components. The integrated embodiments and the separate embodiments of each of these components are also included in the scope of the right without departing from the essence.
Also, some components are not essential components to perform essential functions, but may be optional components only to improve performance. Embodiments may be implemented only with components that are essential to implementing the essentials of the embodiments, and structures within which the optional components are excluded, such as, for example, components used only for performance enhancement, are also included in the scope of the right.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings in order to facilitate embodiments of the present invention by those skilled in the art. In the following description of the embodiments, detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present disclosure rather unclear.
Hereinafter, the terms "application" and the term "app" can be used interchangeably and can be interchanged with each other.
1 shows a configuration of an information inquiry system according to an example.
The information query system 100 may include a
The
The user's
The
The
The
The
In the following, in addition to the results of a conventional information inquiry, embodiments for providing feedback to an information inquiry to a
2 is a configuration diagram of a server according to an example.
2, the
The
The
3 is a flow diagram of a method of providing feedback in accordance with one embodiment.
In step 310, the
In
For example, the
For example, the
The
Also, the
In
For example, the
For example, the
In some cases, the result of inquiry of information may not exist. That is to say, there may not be any information regarding the inquiry object for which the inquiry is requested. In this case, the
In step 340, the
If the outcome of the query does not exist, the above response may indicate that there is no outcome of the inquiry of information. Alternatively, the above response may include the result of an inquiry of information.
In
The
For example, the
For example, when the information requested for inquiry is related to phishing or smearing, the
For example, when requesting the inquiry of information common to users who have a predetermined reference value or more, the
For example, the
In
The data required for feedback may include data required to specify the
For example, in communication between the
Alternatively, the feedback may be provided to other devices associated with the user of the
The data required for feedback can be discarded if the predefined conditions are met. For example, once the
For example, the data required for feedback may include a user identifier (ID), the category of the information for which the query was requested, and the result of an inquiry of the information. The user identifier may be a Caller ID (CID).
At
For example, the database of the
In terms of privacy protection, the processing unit of the
At
At step 390, the
For example, other devices associated with the user of
In providing the feedback to the
The
Through the feedback providing method described above, the
At least some of the above-described
4 is a flow diagram of a method of providing feedback using a push server in accordance with one embodiment.
The embodiment described with reference to Fig. 4 and the embodiment described above with reference to Fig. 3 can have a common part. The
Step 390 may include steps 490 and 495. [
In step 490, the
At step 495, the
A user of the
In terms of protection of the user's personal information, the
In one embodiment, in step 490, the push request may include first user identification information. The first user identification information may be a degree of information that the user can not specify to send feedback only by the first user identification information itself.
The
Feedback to the inquiry of the information can be provided to the
For example, the
By using the
An exemplary scenario of providing feedback (malicious application)
The following scenario illustrates an example where the aforementioned feedback providing method is used in connection with a malicious application.
1) A new virus "A" application may be distributed via the Internet or the like.
2) When a
The information requested by the user in step 410 may be information about a specific object.
At step 410, the
3) Upon request for information inquiry, the
4) In step 440, the
The response may indicate that there is no result of the inquiry of information. For example, the response may include a message of "unknown application." Alternatively, the response may indicate that the safety of the "A" application can not be verified.
5) In
6) Subsequently, the
For example, the
For example, if some victims occur by the "A" application, the
7) At
8) In steps 490 and 495, the
Encryption for protection of personal information
The user can confirm through the
The information requested by the user in step 310 may be information on a specific object. When the information requested by the user is information on a specific object, the specific object is referred to as an object of inquiry.
In addition, the request for information inquiry may include the object of inquiry as described above, and may include information of the object of inquiry. For example, a request for information retrieval may include characters received by the user.
In order to provide feedback to the user, it is necessary to store the information about the object of inquiry or the object of inquiry in the
A method of storing the object of inquiry as it is in the
The text below can indicate the characters received by the user. According to the contents of the characters, the characters received by the user may be suspicious characters.
In
The text below may indicate the encrypted character generated by the
If encryption is performed on the whole of the object of inquiry, there may be a problem that the speed of the inquiry and the overall processing speed are slowed down.
In order to solve such a problem, the
Alternatively, the
It is possible to prevent the problem of slowing the processing speed while protecting the personal information by performing encryption only for a selected part of the harmonization object or excluding a selected part from encryption.
The text below may represent the encrypted character generated by the
Part for privacy protection / separate storage
The
For example, when the object of inquiry is the character received by the user, the
The text below may represent a saved portion of the characters received by the user being viewed. The stored portion may be a portion indicating a URL among characters.
An exemplary scenario of providing feedback (smsing text)
FIG. 5 illustrates a method of providing a request for inquiry of information about a smearing character according to an example and a response to the request.
5, a
The smoothing
The
For example, the
The smoothing
Hereinafter, when a user receives a suspicious character as a smearing character, a process of requesting inquiry of information about the received character and receiving a response to the request will be described. That is to say, in the embodiment below, the object of inquiry may be the character received by the user.
In step 310 described above with reference to FIG. 3, the
In
In
The result of the search may include 1) information indicating whether the received character is a smoothing character. In addition, if the received character is a smoothing character, the result of the search may include 2) an attribute of the smoothing (e.g., smoothing name), and 3) a smoothing warning message.
Alternatively, the
In step 340, the
For example, when the user queries information about the character received or the application installed by the user, the result of the inquiry indicates that the received character is a smoothing character, a safe character, or an unidentified character And may indicate that the application is a secure application.
For example, the response to a request for information retrieval may indicate either yes or no.
In step 340, the
According to the above-described process, the
In addition, the user can not be sure whether a character or an application is safe or can attack, so he can prepare for an attack and continue to have an unstable state. Therefore, the inquiry of the user's information about the character or the application can be repeated, and the user's unstable state may not be solved even by repeated inquiry.
To solve this problem, even after the result of inquiry of the information of the character or the application is provided to the user, the
In the following, the configuration required to provide feedback in relation to smoothing characters is described.
In
For example, when the search result does not exist, or when the search result indicates that the character received by the user is not a smiley character, the
For example, if the result of the search exists, or if the result of the search indicates that the character received by the user is a smearing character, or if the application indicates that it is a malicious application, , It can be determined that feedback is not required.
If it is determined that feedback is needed, then at
Will be described in detail below with reference to Fig. 7 in connection with the
For example, information about a request for an inquiry may include a character received by the user. Alternatively, the information about the inquiry request may include a hash value of the character received by the user. In addition, the information on the inquiry request may include a part of the character received by the user or a hash value of the above part. A part of the characters received by the user may be a part indicating the URL among the characters received by the user.
Next, with reference to Fig. 6, a method of providing feedback on smoothing characters will be described.
Figure 6 illustrates a method for providing feedback on smearing characters according to an example.
At
The new smoothing information may include a smoothing name, a smoothing string, a smoothing URL, a smoothing phone number, a smoothing alert message, and application information. The application information may include an application name, a hash value for application identification, and the like.
When the new smearing information is added, a new smearing information notification can be transmitted to the
When the new smoothing information is added, the
The user to whom feedback is to be provided may be determined through matching between the new smoothing information and the data required for feedback. The matching may be performed by the
For example, if at least one of the smoothing character string, the smoothing URL, and the smoothing phone number of the new smoothing information is present in the received character, it can be determined that the new smoothing information and the character match. Also, the user who received the matched character can be determined as the user to whom the feedback will be provided.
At
Additional results may include: 1) the date and time of the request for information retrieval; and 2) information indicating whether the received character is a smiley character. In addition, if the received character is a smearing character, the result of the search may include 3) an attribute of the smearing (e.g., smearing name), and 4) a smearing warning message.
The following text may indicate a smsing warning message when it is determined that the character received by the user is a smoothing character.
At step 390, the
Figure 7 illustrates information stored in a feedback database according to an example.
The
The user information may be information for providing feedback to the user. For example, the user information may include a user identifier and a user telephone number.
Also, in terms of privacy protection, the user information may include user identification information (e.g., an identifier in the push server 400) corresponding to the user, rather than direct information (e.g., a user's telephone number) A user identifier used by the
The inquiry request information may be information that is included in the request when the inquiry of the user's information is requested. The inquiry request information may be information stored in
For example, the inquiry request information may include a hash value of the user identifier and a hash value of the user telephone number.
For example, the inquiry request information may include information about the inquiry target. The inquiry request information may include a hash value of a character or character received by the user, a URL, and application information. The application information may include an application name and an application hash value.
The lookup time may indicate the time at which a request for information query was sent to the
The information indicating whether or not the processing is performed may be information for preventing additional retrieval from being performed for the already processed request. For example, if feedback is made, the
The apparatus described above may be implemented as a hardware component, a software component, and / or a combination of hardware components and software components. For example, the apparatus and components described in the embodiments may be implemented within a computer system, such as, for example, a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA) A programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to instructions. The processing device may execute an operating system (OS) and one or more software applications running on the operating system. The processing device may also access, store, manipulate, process, and generate data in response to execution of the software. For ease of understanding, the processing apparatus may be described as being used singly, but those skilled in the art will recognize that the processing apparatus may have a plurality of processing elements and / As shown in FIG. For example, the processing unit may comprise a plurality of processors or one processor and one controller. Other processing configurations are also possible, such as a parallel processor.
The software may include a computer program, code, instructions, or a combination of one or more of the foregoing, and may be configured to configure the processing device to operate as desired or to process it collectively or collectively Device can be commanded. The software and / or data may be in the form of any type of machine, component, physical device, virtual equipment, computer storage media, or device , Or may be permanently or temporarily embodied in a transmitted signal wave. The software may be distributed over a networked computer system and stored or executed in a distributed manner. The software and data may be stored on one or more computer readable recording media.
The method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. For example, it is to be understood that the techniques described may be performed in a different order than the described methods, and / or that components of the described systems, structures, devices, circuits, Lt; / RTI > or equivalents, even if it is replaced or replaced.
100: Information retrieval system
110: Client
120: Server
130: Database
Claims (15)
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Determining whether feedback is required for the request
Storing the data required for the feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Generating the additional result and providing the feedback are performed when it is determined that the feedback is needed,
If there is no result of the inquiry, it is determined that the feedback is necessary for the request, and if there is a result of the inquiry, feedback is provided to the inquiry that the feedback is not required for the request Way.
The step of performing the inquiry
Further comprising:
Wherein the response provides feedback on an information query comprising a result of the query.
And if the result of the query is not present, the response provides feedback for an information query indicating that the result does not exist.
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Determining whether feedback is required for the request
Storing the data required for the feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Generating the additional result and providing the feedback are performed when it is determined that the feedback is needed,
And if the information relates to phishing or spamming, providing feedback for an information query that is determined to require the feedback for the request.
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Determining whether feedback is required for the request
Storing the data required for the feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Generating the additional result and providing the feedback are performed when it is determined that the feedback is needed,
And providing feedback to the information inquiry that the feedback is determined to be necessary for the request when the users having the predetermined reference value or more commonly request the inquiry of the information.
And if the request explicitly requests the feedback, feedback is provided for an information query determined that the feedback is needed for the request.
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Storing data required for feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Wherein the data required for the feedback provides feedback for an information query comprising data required to identify the client in the network.
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Storing data required for feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Wherein providing the feedback comprises:
Sending a push request of the feedback to a push server
Lt; / RTI >
Wherein the feedback provides feedback for an information query sent to the client or the other device via the push server.
Wherein the feedback provides feedback on information inquiry sent to the client or the other device via a service provided by the push server.
Wherein the service provided by the push server provides feedback to the information query different from the service the server uses to provide the response to the client.
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Storing data required for feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Wherein the server provides feedback to an information inquiry that provides the user with the feedback related to the information in the future, even if the result of the inquiry does not exist at the time of the request.
Receiving a request for an inquiry of information from a client;
Sending a response to the request to the client;
Storing data required for feedback on the request;
Obtaining data related to the information for which the inquiry is requested;
Generating additional results for the query using data related to the information; And
Providing the feedback comprising the additional result to the client or other device associated with the user of the client
Lt; / RTI >
Wherein the object of inquiry provides feedback on information retrieval, the character received by the user or an application installed by the user.
A processor for storing data required for feedback on the request, obtaining data related to the information for which the query is requested, and generating additional results for the query using data related to the information
Lt; / RTI >
The communication unit provides the feedback on the information inquiry to provide feedback including the additional result to the client or another device associated with the user of the client,
Wherein the data required for the feedback comprises data required to identify the client in the network.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20150117355 | 2015-08-20 | ||
KR1020150117355 | 2015-08-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170022840A KR20170022840A (en) | 2017-03-02 |
KR101790566B1 true KR101790566B1 (en) | 2017-10-27 |
Family
ID=58426573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160007212A KR101790566B1 (en) | 2015-08-20 | 2016-01-20 | Method and apparatus of providing feedback for information searching |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101790566B1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120203770A1 (en) | 2010-09-30 | 2012-08-09 | International Business Machines Corporation | Iterative refinement of search results based on user feedback |
KR101318562B1 (en) * | 2012-06-15 | 2013-10-16 | 김근진 | System and method for providing information for entering school, and recording medium thereof |
-
2016
- 2016-01-20 KR KR1020160007212A patent/KR101790566B1/en active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120203770A1 (en) | 2010-09-30 | 2012-08-09 | International Business Machines Corporation | Iterative refinement of search results based on user feedback |
KR101318562B1 (en) * | 2012-06-15 | 2013-10-16 | 김근진 | System and method for providing information for entering school, and recording medium thereof |
Also Published As
Publication number | Publication date |
---|---|
KR20170022840A (en) | 2017-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11394805B1 (en) | Automatic discovery of API information | |
US11924251B2 (en) | System and method for cybersecurity reconnaissance, analysis, and score generation using distributed systems | |
US11323472B2 (en) | Identifying automated responses to security threats based on obtained communication interactions | |
WO2018113594A1 (en) | Method and device for defending dns attack and storage medium | |
CN109643358B (en) | Cross-tenant data leakage isolation | |
US9628442B2 (en) | DNS snooping to create IP address-based trust database used to select deep packet inspection and storage of IP packets | |
US9094338B2 (en) | Attributes of captured objects in a capture system | |
US9454673B1 (en) | Searchable encryption for cloud storage | |
US8495737B2 (en) | Systems and methods for detecting email spam and variants thereof | |
EP3871392B1 (en) | Network security system with enhanced traffic analysis based on feedback loop | |
US9197419B1 (en) | Security system for data stored in the cloud | |
US8978137B2 (en) | Method and apparatus for retroactively detecting malicious or otherwise undesirable software | |
EP3170091B1 (en) | Method and server of remote information query | |
US10003574B1 (en) | Probabilistic duplicate detection | |
US10536456B2 (en) | Method and system for identifying user information in social network | |
US20110276709A1 (en) | Locational Tagging in a Capture System | |
US9225720B1 (en) | Security system for data stored in the cloud | |
US11178160B2 (en) | Detecting and mitigating leaked cloud authorization keys | |
JP6340358B2 (en) | Information leakage prevention system and method | |
US9641543B2 (en) | Systems and methods for securing remote configuration | |
WO2016169212A1 (en) | File management method and device | |
KR101790566B1 (en) | Method and apparatus of providing feedback for information searching | |
CN111444445A (en) | Data transmission method, system, computer equipment and readable storage medium | |
CN107667518B (en) | Automatic discovery and online of electronic devices | |
US20140366084A1 (en) | Management system, management method, and non-transitory storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
N231 | Notification of change of applicant | ||
GRNT | Written decision to grant |