会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 13. 发明授权
    • Trusted operating environment for malware detection
    • 可靠的恶意软件检测操作环境
    • US08104088B2
    • 2012-01-24
    • US11747345
    • 2007-05-11
    • Reshma KhilnaniKristofer N. Iverson
    • Reshma KhilnaniKristofer N. Iverson
    • H04L9/32G06F11/00G06F11/30
    • G06F21/57G06F21/564
    • Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    • 描述了用于扫描计算设备以用于恶意软件的技术和设备。 在一个实现中,包括可信操作系统和可信赖的防病毒工具的可信操作环境体现在可移动数据存储介质上。 然后使用可信操作系统从可移动数据存储介质引导计算设备。 可信任的防病毒工具在计算设备上搜索恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在另一实现中,计算设备从可移动设备上的可信操作系统引导,并且可移动设备上的可信防病毒工具扫描计算设备以获取恶意软件。 可移动设备可以通过搜索计算设备或远程资源来更新其自己的内部组件(例如,病毒签名和防病毒工具),并验证所位于的任何更新。
    • 14. 发明申请
    • TRUSTED OPERATING ENVIRONMENT FOR MALWARE DETECTION
    • 恶意操作环境进行恶意软件检测
    • US20110214186A1
    • 2011-09-01
    • US13102324
    • 2011-05-06
    • Reshma P. KhilnaniKristofer N. Iverson
    • Reshma P. KhilnaniKristofer N. Iverson
    • G06F21/00
    • G06F21/575G06F21/00G06F21/567
    • Described herein are techniques and apparatuses for scanning a computing device for malware and/or viruses. In various embodiments, a trusted operating environment, which may include a trusted operating system and/or a trusted antivirus tool, may be utilized with respect to a computing device. More particularly, the trusted operating system may be used to boot the computing device. Moreover, the trusted antivirus tool may search the computing device for malware definition updates (e.g., virus signature updates) and use the trusted operating system to scan the computing device for malware. In other embodiments, the trusted antivirus tool may scan the computing device and remove any viruses detected by the trusted antivirus tool. The trusted operating system may then reboot the computing device into a clean environment once any detected viruses are removed.
    • 这里描述了用于扫描计算设备以用于恶意软件和/或病毒的技术和装置。 在各种实施例中,相对于计算设备可以使用可包括可信操作系统和/或可信防病毒工具的可信操作环境。 更具体地,可信操作系统可以用于引导计算设备。 此外,信任的防病毒工具可以搜索计算设备中的恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在其他实施例中,信任的防病毒工具可以扫描计算设备并且去除由可信防病毒工具检测到的任何病毒。 一旦任何检测到的病毒被移除,受信操作系统就可以将计算设备重新启动到干净的环境中。
    • 15. 发明申请
    • IMAGE-BASED HUMAN INTERACTIVE PROOFS
    • 基于图像的人际交往项目
    • US20100162357A1
    • 2010-06-24
    • US12339402
    • 2008-12-19
    • David M. ChickeringKristofer N. Iverson
    • David M. ChickeringKristofer N. Iverson
    • G06K9/00G06K9/68
    • G06F21/36G06F2221/2133
    • This document describes image-based human interactive proofs (HIPs). In some cases these proofs may be used when a browser at a client is used to access resources from a web server. Before access to the resources is enabled, the client can be challenged by the web server with an image-based puzzle. The image-based puzzle is configured to enable distinctions to be made between human input and non-human input. Input to answer the image-based puzzle can be formed via the client and communicated to the web server. The web server receives the input from the client and selectively enables client access to the resources based upon the input. In at least some embodiments, the web server can make use of a community database that stores client answers to image-based puzzles to assist in distinguishing between human input and non-human input.
    • 本文档描述了基于图像的人工交互式证明(HIP)。 在某些情况下,当客户端的浏览器用于从Web服务器访问资源时,可能会使用这些证明。 在启用资源访问之前,客户端可能会受到基于图像的难题的Web服务器的挑战。 基于图像的拼图被配置为能够在人类输入和非人类输入之间进行区分。 可以通过客户端形成基于图像的拼图的输入,并传达给Web服务器。 Web服务器从客户端接收输入,并根据输入选择性地启用客户端对资源的访问。 在至少一些实施例中,网络服务器可以利用社区数据库来存储基于图像的谜题的客户端答案,以帮助区分人类输入和非人类输入。
    • 16. 发明申请
    • Trusted Operating Environment for Malware Detection
    • 恶意软件检测的可信操作环境
    • US20080282351A1
    • 2008-11-13
    • US11747416
    • 2007-05-11
    • Reshma KhilnaniKristofer N. Iverson
    • Reshma KhilnaniKristofer N. Iverson
    • G06F12/14
    • G06F21/567G06F21/575
    • Techniques and apparatuses for scanning a computing device for malware are described. In one implementation, a trusted operating environment, which includes a trusted operating system and a trusted antivirus tool, is embodied on a removable data storage medium. A computing device is then booted from the removable data storage medium using the trusted operating system. The trusted antivirus tool searches the computing device for malware definition updates (e.g., virus signature updates) and uses the trusted operating system to scan the computing device for malware. In another implementation, a computing device is booting from a trusted operating system on a removable device and a trusted antivirus tool on the removable device scans the computing device for malware. The removable device can update its own internal components (e.g., virus signatures and antivirus tool) by searching the computing device or a remote resource for updates and authenticating any updates that are located.
    • 描述了用于扫描计算设备以用于恶意软件的技术和设备。 在一个实现中,包括可信操作系统和可信赖的防病毒工具的可信操作环境体现在可移动数据存储介质上。 然后使用可信操作系统从可移动数据存储介质引导计算设备。 可信任的防病毒工具在计算设备上搜索恶意软件定义更新(例如,病毒签名更新),并使用可信操作系统扫描计算设备以获取恶意软件。 在另一实现中,计算设备从可移动设备上的可信操作系统引导,并且可移动设备上的可信防病毒工具扫描计算设备以获取恶意软件。 可移动设备可以通过搜索计算设备或远程资源来更新其自己的内部组件(例如,病毒签名和防病毒工具),并验证所位于的任何更新。
    • 19. 发明申请
    • ACCESSIBLE CONTENT REPUTATION LOOKUP
    • 可访问的内容报告
    • US20110167328A1
    • 2011-07-07
    • US13050585
    • 2011-03-17
    • Kristofer N. Iverson
    • Kristofer N. Iverson
    • G06F17/30
    • H04L63/1441
    • Implementations of accessible content reputation lookup are described. In one implementation, before a user activates a link in a document, such as a hyperlink on a webpage, the user can designate the link. For example, the user can float a cursor over the link or interact with an icon placed proximate to the link. By designating the link, the user can request reputation information associated with the link, including information as to whether or not content associated with the link, an application used to access the content, and/or source(s) on which the content resides, are known to be dangerous or risky. If the reputation information indicates that the link is safe to activate, the user can activate the link and access the content. Alternately, if the reputation information indicates that the link is unsafe to access, the user can choose to forego activation of the link.
    • 描述可访问内容信誉查询的实现。 在一个实现中,在用户激活文档中的链接(例如网页上的超链接)之前,用户可以指定链接。 例如,用户可以将光标浮在链接上或与靠近链接放置的图标交互。 通过指定链接,用户可以请求与链接相关联的信誉信息,包括关于与链接相关联的内容的信息,用于访问内容的应用和/或内容所在的源, 已知是危险的或有风险的。 如果信誉信息表明该链接是安全的激活,则用户可以激活链接并访问该内容。 或者,如果信誉信息指示链路不安全地访问,则用户可以选择放弃链接的激活。