会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Attack resistant phishing detection
    • 防攻击钓鱼侦测
    • US07925883B2
    • 2011-04-12
    • US11360900
    • 2006-02-23
    • Dinei A. FlorencioCormac E. Herley
    • Dinei A. FlorencioCormac E. Herley
    • H04L9/00
    • H04L9/3226H04L9/3297H04L63/14H04L63/1483H04L2209/56
    • A phishing detection server component and method is provided. The component can be employed as part of a system to detect/phishing attacks. The phishing detection server component can receive password reuse event report(s), for example, from a protection component of client component(s).Due to the malicious nature of phishing in general, the phishing detection server component can be susceptible to attacks by phishers (e.g., by reverse engineering of the client component). For example, false report(s) of PREs can be received from phisher(s) in an attempt to overwhelm the server component, induce false positives and/or induce false negatives.Upon receipt of a PRE report, the phishing detection server component can first verify that the timestamp(s) are genuine (e.g., previously generated by the phishing detection server component). The report verification component can employ the timestamp(s) to verify veracity of the report (e.g., to minimize attacks by phishers).
    • 提供了一种网络钓鱼检测服务器组件和方法。 该组件可以用作系统的一部分来检测/网络钓鱼攻击。 网络钓鱼检测服务器组件可以例如从客户端组件的保护组件接收密码重用事件报告。 由于一般的网络钓鱼的恶意性质,网络钓鱼检测服务器组件可能受钓鱼者的攻击(例如,通过客户端组件的逆向工程)。 例如,可以从钓鱼者收到PRE的虚假报告,以试图压倒服务器组件,诱发误报和/或诱发假阴性。 在收到PRE报告后,网络钓鱼检测服务器组件可以首先验证时间戳是真实的(例如,先前由网络钓鱼检测服务器组件产生的)。 报告验证组件可以使用时间戳来验证报告的真实性(例如,最小化钓鱼者的攻击)。
    • 15. 发明申请
    • PEER TO PEER NETWORK
    • 同行对等网络
    • US20080201415A1
    • 2008-08-21
    • US12045512
    • 2008-03-10
    • Cormac E. Herley
    • Cormac E. Herley
    • G06F15/16
    • H04L67/104H04L67/1063H04L67/1082
    • A system and method for data distribution is disclosed. A bulletin board is employed to maintain a list of requests from nodes in the system. The requests indicate data requested and identify the node making the request. Nodes are able to post requests for data as long as they maintain a minimum performance level. Additionally, the nodes periodically check in with the bulletin board and receive the list of requests from the bulletin board. On determining to satisfy a particular request by a node, the node (serving node) contacts a requesting node (identified in the request) and transfers the requested data to the requesting node. After successful completion of the transfer, the requesting node reports to the bulletin board that the node has filled the request and the request is removed from the list of requests.
    • 公开了一种用于数据分配的系统和方法。 采用公告牌来维护系统中节点的请求列表。 请求指示请求的数据,并标识发出请求的节点。 节点能够发布数据请求,只要它们保持最低的性能水平。 此外,节点还可以使用公告板定期检查并接收公告板上的请求列表。 在确定满足节点的特定请求时,节点(服务节点)联系请求节点(在请求中标识)并将请求的数据传送到请求节点。 在成功完成传输之后,请求节点向公告板报告节点填写了请求,并且请求从请求列表中移除。
    • 16. 发明授权
    • Detecting multiple objects in digital image data
    • 检测数字图像数据中的多个对象
    • US07058224B2
    • 2006-06-06
    • US11085412
    • 2005-03-21
    • Cormac E. Herley
    • Cormac E. Herley
    • G06K9/00
    • H04N1/00766G06T7/12G06T2207/10008G06T2207/20061H04N1/00681H04N1/00689H04N1/00702H04N1/00737H04N1/00753
    • Apparatus and methods for detecting multiple images in digital image data are described. In one aspect, an edge map is generated from image data. The edge map is analyzed to determine a set of boundaries of the one or more objects by. This analysis is accomplished by: (a) determining a set of transitions between the set of boundaries and a background color; (b) identifying a set of characteristics from the set of transitions, wherein the set of characteristics are used to indicate whether the image data comprises a single object or whether the image data comprises a plurality of objects; and (c) if the image data corresponds to a plurality of objects, assigning particular ones of the set of boundaries to particular ones of the plurality of objects based on a set of rules. The one or more objects are segmented based on the set of boundaries.
    • 描述了用于检测数字图像数据中的多个图像的装置和方法。 在一个方面,从图像数据生成边缘图。 分析边缘图以确定一个或多个对象的一组边界。 该分析是通过以下方式实现的:(a)确定一组边界与背景颜色之间的一组过渡; (b)从所述一组转换中识别一组特征,其中所述特征集用于指示所述图像数据是包括单个对象还是所述图像数据是否包括多个对象; 以及(c)如果所述图像数据对应于多个对象,则基于一组规则将所述一组边界的特定特征分配给所述多个对象中的特定对象。 一个或多个对象基于边界集分割。
    • 19. 发明授权
    • Use of popularity information to reduce risk posed by guessing attacks
    • 使用流行度信息来减少猜测攻击带来的风险
    • US08959644B2
    • 2015-02-17
    • US12912782
    • 2010-10-27
    • Stuart E. SchechterCormac E. HerleyMichael D. Mitzenmacher
    • Stuart E. SchechterCormac E. HerleyMichael D. Mitzenmacher
    • G06F21/00
    • G06F21/00G06F21/46
    • A popularity determination module (PDM) is described which reduces the effectiveness of statistical guessing attacks. The PDM operates by receiving a password (or other secret information item) from a user. The PDM uses a model to determine whether the password is popular among a group of users. If so, the PDM may ask the user to select another password. In one implementation, the model corresponds to a probabilistic model, such a count-min sketch model. The probabilistic model provides an upper-bound assessment of a number of times that a password has been encountered. Further, the probabilistic model provides false positives (in which passwords are falsely assessed as popular) at a rate that exceeds a prescribed minimum rate. The false positives are leveraged to reduce the effectiveness of statistical guessing attacks by malicious entities.
    • 描述了流行度确定模块(PDM),其降低了统计猜测攻击的有效性。 PDM通过从用户接收密码(或其他秘密信息项)来操作。 PDM使用模型来确定密码在一组用户中是否流行。 如果是这样,PDM可能会要求用户选择另一个密码。 在一个实现中,模型对应于概率模型,例如计数最小素描模型。 概率模型提供了密码遇到次数的上限评估。 此外,概率模型以超过规定的最低利率的速率提供误报(其中密码被错误地评估为流行)。 利用假阳性来降低恶意实体的统计猜测攻击的有效性。