会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 15. 发明授权
    • Determining relative attack surface
    • 确定相对攻击面
    • US07299497B2
    • 2007-11-20
    • US10609934
    • 2003-06-30
    • Michael Howard
    • Michael Howard
    • G08B23/00
    • H04L63/104G06F21/577
    • The relative attack surface quotient is computed for products to determine their relative susceptibility to attack. The relative attack surface can be calculated by identifying known avenues of attack that correspond to the product and by determining bias values that should be applied to the avenues of attack based upon desired criteria, including, the potential damage that can be caused by an attack. The appropriate bias is applied to each avenue of attack and the resulting bias-applied values are combined into a single relative attack surface quotient. The relative attack surface can be determined prior to or during utilization of a product. The product may include software, computing devices and networks. Upon determining a relative attack surface is too high, utilization of the product can be restricted.
    • 对产品计算相对攻击面商,以确定其相对的攻击敏感性。 可以通过识别与产品相对应的已知攻击途径,并通过根据所需标准确定应适用于攻击途径的偏差值来计算相对攻击面,包括攻击引起的潜在伤害。 将适当的偏差应用于每个攻击大道,并将所得到的偏置应用值组合成单个相对攻击面商。 可以在产品使用之前或期间确定相对攻击表面。 该产品可能包括软件,计算设备和网络。 在确定相对攻击面太高时,可以限制产品的利用。
    • 16. 发明授权
    • Rapid application security threat analysis
    • 快速应用安全威胁分析
    • US07243374B2
    • 2007-07-10
    • US09927427
    • 2001-08-08
    • Michael HowardPraerit GargLoren M. Kohnfelder
    • Michael HowardPraerit GargLoren M. Kohnfelder
    • G06F11/30
    • G06F21/577
    • The following subject matter provides for modeling an application's potential security threats at a logical component level early in the design phase of the application. Specifically, in a computer system, multiple model components are defined to represent respective logical elements of the application. Each model component includes a corresponding set of security threats that could potentially be of import not only to the component but also to the application as a whole in its physical implementation. The model components are interconnected to form a logical model of the application. One or more potential security threats are then analyzed in terms of the model components in the logical model.
    • 以下主题提供了在应用程序设计阶段的逻辑组件级别对应用程序的潜在安全威胁进行建模。 具体来说,在计算机系统中,定义了多个模型组件来表示应用程序的各个逻辑元素。 每个模型组件都包含一组相应的安全威胁,这些安全威胁可能不仅可以导入到组件中,而且还可以整体引入其物理实现中。 模型组件互连以形成应用程序的逻辑模型。 然后根据逻辑模型中的模型组件分析一个或多个潜在的安全威胁。