会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Hypervisor assisted single instance data access by multiple virtual machines
    • 虚拟机管理程序辅助多个虚拟机的单一实例数据访问
    • US08413146B1
    • 2013-04-02
    • US12940835
    • 2010-11-05
    • Bruce McCorkendaleDavid BuchesWilliam E. Sobel
    • Bruce McCorkendaleDavid BuchesWilliam E. Sobel
    • G06F9/455
    • G06F9/45558G06F2009/45575G06F2009/45579G06F2009/45583
    • A data instance to be shared by multiple virtual machines is stored at a hypervisor level. A file system driver is provided to each virtual machine. Each virtual machine mounts a file system backed by the data instance, and thus has read access to the data through its mounted file system. A virtual machine is suspended. A copy of the data instance is saved as part of the stored image of the suspended virtual machine. The suspended virtual machine is subsequently restored from the stored image, and the copy of the data instance is present in the restored virtual machine. The copy of the data instance is detected at a hypervisor level, and the restored virtual machine is provided with read access to the data instance through its mounted filed system.
    • 要由多个虚拟机共享的数据实例存储在管理程序级别。 文件系统驱动程序提供给每个虚拟机。 每个虚拟机安装由数据实例支持的文件系统,从而通过其安装的文件系统读取对数据的访问。 虚拟机被暂停。 数据实例的副本将作为已暂停虚拟机的存储映像的一部分进行保存。 被暂停的虚拟机随后从存储的映像还原,并且数据实例的副本存在于还原的虚拟机中。 在虚拟机管理程序级别检测数据实例的副本,并通过其安装的现场系统向恢复的虚拟机提供对数据实例的读取访问。
    • 37. 发明授权
    • Enforcement of compliance with network security policies
    • 执行网络安全策略
    • US07249187B2
    • 2007-07-24
    • US10305622
    • 2002-11-27
    • William E SobelGreg VogelBruce McCorkendale
    • William E SobelGreg VogelBruce McCorkendale
    • G06F15/16
    • H04L63/105H04L63/20
    • Methods, apparati, and computer program products enforce computer network security policies by assigning network membership to a client (105) based on the client's compliance with the security policies. When a client (105) requests (305) a network address, the DHCP proxy (110) intercepts the request and assigns (350) that client (105) a logical address on the protected network (140) if the client (105) is in compliance with the security policies. If the client (105) is not in compliance with the security policies, in various embodiments, the DHCP proxy (110) assigns (350) the client (105) an address on a restricted network (145) or no network address at all.
    • 方法,设备和计算机程序产品通过根据客户端遵守安全策略向客户端(105)分配网络成员来强制执行计算机网络安全策略。 当客户端(105)请求(305)网络地址时,如果客户机(105)是(305)的客户端(105)是网络地址,则DHCP代理(110)拦截该请求并且在该保护网络(140)上分配(350) 符合安全政策。 如果客户端(105)不符合安全策略,则在各种实施例中,DHCP代理(110)分配(350)客户端(105)在受限网络(145)上的地址或根本不分配网络地址。
    • 38. 发明授权
    • Alteration of module load locations
    • 改变模块负载位置
    • US07155741B2
    • 2006-12-26
    • US10140149
    • 2002-05-06
    • William E SobelBruce McCorkendale
    • William E SobelBruce McCorkendale
    • H04L9/00
    • G06F21/52G06F21/51
    • Buffer overflow attacks are prevented by altering the load locations of commonly used executable code modules. A monitor layer (210) is associated with an operating system (220) and controls the load locations for predetermined modules containing executable code that can be used in the execution of buffer overflow attacks. The monitor layer (210) applies predetermined criteria to determine whether a module (280) presents a high risk for enabling a buffer overflow attack. If the monitor layer (210) determines that the module (280) presents a high risk, the monitor layer (210) may force the module (280) to load in an alternate location (290) by reserving sections of memory (295) into which the module normally loads. Alternatively, the monitor layer (210) may alter the area of the module that directs the operating system (220) to load it into a particular location (295), thus causing the operation system to load the module to an alternate location (290).
    • 通过更改常用可执行代码模块的加载位置来防止缓冲区溢出攻击。 监视器层(210)与操作系统(220)相关联并且控制包含可用于执行缓冲器溢出攻击的可执行代码的预定模块的加载位置。 监视器层(210)应用预定标准来确定模块(280)是否具有启用缓冲器溢出攻击的高风险。 如果监视器层(210)确定模块(280)具有高风险,则监视器层(210)可以通过将存储器(295)的部分保留在模块(280)中来将模块(280)加载到备用位置(290)中 模块通常加载。 或者,监视器层(210)可以改变引导操作系统(220)的模块的区域以将其加载到特定位置(295),从而使操作系统将模块加载到备用位置(290) 。