会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Automatic immune system for computers and computer networks
    • 用于计算机和计算机网络的自动免疫系统
    • US5440723A
    • 1995-08-08
    • US4872
    • 1993-01-19
    • William C. ArnoldDavid M. ChessJeffrey O. KephartSteven R. White
    • William C. ArnoldDavid M. ChessJeffrey O. KephartSteven R. White
    • G06F1/00G06F21/56H04L29/06G06F11/00
    • H04L63/1441G06F21/564G06F21/566
    • A method includes the following component steps, or some functional subset of these steps: (A) periodic monitoring of a data processing system (10) for anomalous behavior that may indicate the presence of an undesirable software entity such as a computer virus, worm, or Trojan Horse; (B) automatic scanning for occurrences of known types of undesirable software entities and taking remedial action if they are discovered; (C) deploying decoy programs to capture samples of unknown types of computer viruses; (D) identifying machine code portions of the captured samples which are unlikely to vary from one instance of the virus to another; (E) extracting an identifying signature from the executable code portion and adding the signature to a signature database; (F) informing neighboring data processing systems on a network of an occurrence of the undesirable software entity; and (G) generating a distress signal, if appropriate, so as to call upon an expert to resolve difficult cases. A feature of this invention is the automatic execution of the foregoing steps in response to a detection of an undesired software entity, such as a virus or a worm, within a data processing system. The automatic extraction of the identifying signature, the addition of the signature to a signature data base, and the immediate use of the signature by a scanner provides protection from subsequent infections of the system, and also a network of systems, by the same or an altered form of the undesirable software entity.
    • 一种方法包括以下组件步骤或这些步骤的一些功能子集:(A)针对异常行为的数据处理系统(10)的周期性监视,其可以指示存在不期望的软件实体,例如计算机病毒,蠕虫, 或特洛伊木马; (B)自动扫描已知类型的不合需要的软件实体,并发现补救措施; (C)部署诱饵计划以捕获未知类型的计算机病毒样本; (D)识别捕获的样本的机器代码部分,其不可能从病毒的一个实例变化到另一个; (E)从可执行代码部分提取识别签名并将签名添加到签名数据库; (F)通知网络上的相邻数据处理系统出现不期望的软件实体; 和(G)如果适当,产生遇险信号,以呼吁专家解决困难的情况。 本发明的一个特征是响应于在数据处理系统内检测不期望的软件实体(例如病毒或蠕虫)来自动执行上述步骤。 识别签名的自动提取,签名数据库的签名添加以及扫描仪的签名的即时使用提供了保护,防止系统的随后的感染以及系统的相同或不同的系统的网络 改变形式的不良软件实体。
    • 14. 发明授权
    • Secure management of keys using extended control vectors
    • 使用扩展控制向量的密钥的安全管理
    • US4924515A
    • 1990-05-08
    • US398299
    • 1989-08-24
    • Stephen M. MatyasDennis G. AbrahamWilliam C. ArnoldDonald B. JohnsonRamesh K. KarneAn V. LeRostislaw PrymakSteve R. WhiteJohn D. Wilkins
    • Stephen M. MatyasDennis G. AbrahamWilliam C. ArnoldDonald B. JohnsonRamesh K. KarneAn V. LeRostislaw PrymakSteve R. WhiteJohn D. Wilkins
    • H04L9/08
    • H04L9/088H04L9/0643H04L2209/12
    • A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The improved method and apparatus enable the use of control vectors having an arbitrary length. It includes a control vector register having an arbitrary length, for storing a control vector of arbitrary length associated with an N-bit cryptographic key. It further includes a control vector checking means having an input coupled to the control vector register, for checking that the control vector authorizes the cryptographic function which is requested by the cryptographic service request. It further includes a hash function generator having an input coupled to the control vector register and an N-bit output, for mapping the control vector output from the control vector register, into an N-bit hash value. A key register is included for storing the N-bit cryptographic key. It further includes a logic block having a first input coupled to the N-bit output of the hash function generator, and a second input connected to the key register, for forming at the output thereof a product of the N-bit key and the N-bit hash value. Finally, an encryption device is included having a first input for receiving a cleartext data stream and a key input coupled to the output of the logic block, for forming a ciphertext data stream at the output thereof from the cleartext data stream and the product. A decryption device can be substituted for the encryption device to perform decryption operations in a similar manner.
    • 公开了一种在数据处理系统中使用的方法和装置,该数据处理系统执行一个程序,该程序输出密码服务请求,该密码服务请求与密码密钥相关联,该控制向量定义每个密钥由其发起者允许执行的功能。 改进的方法和装置使得能够使用具有任意长度的控制向量。 它包括具有任意长度的控制向量寄存器,用于存储与N位加密密钥相关联的任意长度的控制向量。 它还包括控制向量检查装置,其具有耦合到控制向量寄存器的输入,用于检查控制向量授权由密码服务请求请求的加密功能。 它还包括具有耦合到控制向量寄存器的输入和用于将从控制向量寄存器输出的控制矢量映射到N位散列值的N位输出的散列函数发生器。 包含密钥寄存器用于存储N位加密密钥。 它还包括具有耦合到散列函数发生器的N位输出的第一输入和连接到键寄存器的第二输入的逻辑块,用于在其输出处形成N位键和N的乘积 位散列值。 最后,包括具有用于接收明文数据流的第一输入和耦合到逻辑块的输出的键输入的加密装置,用于在明文数据流和产品的输出处形成密文数据流。 解密装置可以代替加密装置以类似的方式执行解密操作。
    • 18. 发明申请
    • DEPLOYMENT PATTERN REALIZATION WITH MODELS OF COMPUTING ENVIRONMENTS
    • 与计算环境模型的部署模式实现
    • US20100070449A1
    • 2010-03-18
    • US12210139
    • 2008-09-12
    • William C. ArnoldTamar EilamMichael H. KalantarAlexander V. KonstantinouAlexander A. Totok
    • William C. ArnoldTamar EilamMichael H. KalantarAlexander V. KonstantinouAlexander A. Totok
    • G06N5/02
    • G06N5/02
    • Deployment pattern matching is implemented by accessing a target computing environment model that captures environment modeling parameters relating to resources and resource-resource relationships of a corresponding computing environment and expressing the target computing environment model as a model graph defined by target resource elements and resource-to-resource relationship links. Deployment pattern matching is further implemented by accessing a realization pattern that captures deployment parameters relating to resources and resource-resource relationships of a deployment of interest and expressing the realization pattern as a pattern graph defined by conceptual resource elements and constraints arranged by resource-to-resource relationship links and constraint links. The realization pattern is then evaluated against the target computing environment model by executing at least one pattern matching algorithm that attempts to match the pattern graph to the model graph and information corresponding to results of the evaluation are conveyed.
    • 通过访问捕获与相应计算环境的资源和资源 - 资源关系相关的环境建模参数的目标计算环境模型来实现部署模式匹配,并将目标计算环境模型表示为由目标资源元素和资源到 资源关系链接。 通过访问捕获与资源相关的部署参数和感兴趣的部署的资源 - 资源关系的实现模式进一步实现部署模式匹配,并且将实现模式表示为由概念资源元素定义的模式图,并且由资源 - 资源关系链接和约束链接。 然后通过执行尝试将模式图与模型图匹配的至少一个模式匹配算法来针对目标计算环境模型来评估实现模式,并且传达与评估结果相对应的信息。