会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Enhanced security and performance of web applications
    • 增强Web应用程序的安全性和性能
    • US08677141B2
    • 2014-03-18
    • US11944460
    • 2007-11-23
    • Ulfar ErlingssonYinglian XieBen LivshitsCedric Fournet
    • Ulfar ErlingssonYinglian XieBen LivshitsCedric Fournet
    • G06F11/30H04L9/32G06F12/14G06F7/04G06F11/00H03M13/00G06F9/44
    • H04L63/1416G06F21/305G06F21/54G06F2221/2119G06F2221/2141H04L63/102
    • A client-side enforcement mechanism may allow application security policies to be specified at a server in a programmatic manner. Servers may specify security policies as JavaScript functions included in a page returned by the server and run before other scripts. At runtime, and during initial loading, the functions are invoked by the client on each page modification to ensure the page conforms to the security policy. As such, before a mutation takes effect, the policy may transform that mutation and the code and data of the page. Replicated code execution may take place at both the client and the server where the server runs its own shadow copy of a client-side application in a trusted execution environment so that the server may check that the method calls coming from the client correspond to a correct execution of the client-side application The redundant execution at the client can be untrusted, but serves to improve the responsiveness and performance of the Web application.
    • 客户端执行机制可以允许以编程方式在服务器处指定应用安全策略。 服务器可以将安全策略指定为服务器返回的页面中包含的JavaScript函数,并在其他脚本之前运行。 在运行时,并且在初始加载期间,客户机在每次修改页面时调用这些功能,以确保页面符合安全策略。 因此,在突变生效之前,策略可以转换该突变以及页面的代码和数据。 复制的代码执行可以在客户端和服务器上进行,其中服务器在可信执行环境中运行其自己的客户端应用程序的卷影副本,以便服务器可以检查来自客户机的方法调用是否对应于正确的 客户端应用程序的执行客户机上的冗余执行可以不受信任,但用于提高Web应用程序的响应性和性能。
    • 32. 发明授权
    • Fingerprinting event logs for system management troubleshooting
    • 指纹事件日志用于系统管理故障排除
    • US08069374B2
    • 2011-11-29
    • US12394451
    • 2009-02-27
    • Rina PanigrahyChad VerbowskiYinglian XieJunfeng YangDing Yuan
    • Rina PanigrahyChad VerbowskiYinglian XieJunfeng YangDing Yuan
    • G06F11/00
    • G06F11/079G06F11/0709G06F11/0715H04L41/16
    • A technique for automatically detecting and correcting configuration errors in a computing system. In a learning process, recurring event sequences, including e.g., registry access events, are identified from event logs, and corresponding rules are developed. In a detecting phase, the rules are applied to detected event sequences to identify violations and to recover from failures. Event sequences across multiple hosts can be analyzed. The recurring event sequences are identified efficiently by flattening a hierarchical sequence of the events such as is obtained from the Sequitur algorithm. A trie is generated from the recurring event sequences and edges of nodes of the trie are marked as rule edges or non-rule edges. A rule is formed from a set of nodes connected by rule edges. The rules can be updated as additional event sequences are analyzed. False positive suppression policies include a violation-consistency policy and an expected event disappearance policy.
    • 一种自动检测和纠正计算系统中配置错误的技术。 在学习过程中,从事件日志中识别循环事件序列,包括例如注册表访问事件,并且开发相应的规则。 在检测阶段,将规则应用于检测到的事件序列以识别违例行为并从故障中恢复。 可以分析多个主机的事件序列。 通过对诸如从Sequitur算法获得的事件的分层序列进行平坦化来有效地识别循环事件序列。 从循环事件序列生成特里(trie),并将特里斯的节点的边缘标记为规则边缘或非规则边缘。 规则是由一组通过规则边连接的节点形成的。 当分析附加事件序列时,可以更新规则。 虚假的积极抑制政策包括违规一致性政策和预期的事件消失政策。