会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Real-time in-line detection of malicious code in data streams
    • 实时在线检测数据流中的恶意代码
    • US07802303B1
    • 2010-09-21
    • US11478705
    • 2006-06-30
    • Xiaoming ZhaoGang ChenPaul Hong
    • Xiaoming ZhaoGang ChenPaul Hong
    • G08B23/00G06F12/14
    • G06F21/564
    • In one embodiment, a data stream is scanned for presence of computer viruses using a stream-based protocol parser, a stream-based decoder/decompressor, and a stream-based pattern matching engine. The protocol parser may be configured to extract application layer content from the data stream to generate a file stream. The protocol parser may stream the file stream to the decoder/decompressor, which may decode/decompress the file stream to generate a plain stream. The decoder/decompressor may stream the plain stream to the pattern matching engine, which in turn may scan the plain stream for viruses. Advantageously, the aforementioned components may perform its function as soon as streaming data becomes available, without having to wait for the entirety of the data.
    • 在一个实施例中,使用基于流的协议解析器,基于流的解码器/解压缩器和基于流的模式匹配引擎扫描数据流以存在计算机病毒。 协议解析器可以被配置为从数据流中提取应用层内容以生成文件流。 协议解析器可以将文件流传送到解码器/解压缩器,其可解码/解压缩文件流以生成简单流。 解码器/解压缩器可以将平滑流传送到模式匹配引擎,该引擎又可以扫描普通流的病毒。 有利的是,只要流数据变得可用,上述组件可以执行其功能,而不必等待整个数据。
    • 42. 发明授权
    • Reliable delivery of updates for antivirus programs
    • 可靠的交付防病毒程序的更新
    • US07756992B1
    • 2010-07-13
    • US11242178
    • 2005-09-30
    • Xiaoming Zhao
    • Xiaoming Zhao
    • G06F11/30G06F12/14G06F15/16G06F15/173
    • H04L63/145
    • In one embodiment, an update file for an antivirus program is disassembled into several source packets. The source packets may be encoded using a forward error correction (FEC) algorithm to generate encoded packets. The encoded packets may include the source packets and redundant packets, the redundant packets including information that allows a client computer that includes the antivirus program to recreate the source packets even if it never receives all of the encoded packets. The FEC algorithm may be selected from several FEC algorithms based on the number of the source packets. The transmission of the encoded packets from a server computer to the client computer may be stopped when the client computer has received enough of the encoded packets to recreate the source packets.
    • 在一个实施例中,用于防病毒程序的更新文件被分解成多个源分组。 可以使用前向纠错(FEC)算法对源分组进行编码,以生成编码分组。 编码的分组可以包括源分组和冗余分组,冗余分组包括允许包括防病毒程序的客户端计算机重新创建源分组的信息,即使它从未接收到所有编码的分组。 可以基于源分组的数量从多个FEC算法中选择FEC算法。 当客户端计算机已经接收到足够的编码分组以重新创建源分组时,可以停止将编码分组从服务器计算机传输到客户端计算机。
    • 45. 发明授权
    • Techniques for protecting telephone users from caller ID spoofing attacks
    • 保护电话用户免受来电显示欺骗攻击的技术
    • US08135119B1
    • 2012-03-13
    • US12264514
    • 2008-11-04
    • Xiaoming ZhaoGang ChenKan Dong
    • Xiaoming ZhaoGang ChenKan Dong
    • H04M1/56
    • H04M1/57H04M1/642H04M1/663H04M1/665H04M1/7385
    • A caller ID verifier may be employed to protect telephone users against caller ID spoofing. The caller ID verifier may be implemented in a telephony apparatus, such as a smart phone, stand alone caller ID device, or telephone network infrastructure, for example. Telephone numbers of related callers may be grouped into caller groups. The caller ID verifier may be configured to play one of several audio messages depending on the caller group of the telephone number corresponding to the caller ID of the telephone call. An audio message may include a question. The caller ID verifier may forward the telephone call to the telephone user when the caller answers the question correctly. Otherwise, the caller ID verifier may terminate the telephone call and give the telephone user the option to return the telephone call using the caller ID.
    • 可以采用呼叫者ID验证器来保护电话用户免受呼叫者ID欺骗。 呼叫者ID验证器可以在例如智能电话,独立呼叫者ID设备或电话网络基础设施的电话设备中实现。 相关呼叫者的电话号码可以分组到呼叫者组中。 呼叫者ID验证器可以被配置为根据与电话呼叫的呼叫者ID相对应的电话号码的呼叫者组来播放几个音频消息中的一个。 音频消息可能包含一个问题。 当主叫方正确地回答问题时,呼叫者ID验证者可以将电话呼叫转发给电话用户。 否则,呼叫者ID验证者可以终止电话呼叫并给电话用户使用呼叫者ID返回电话呼叫的选项。
    • 48. 发明授权
    • Method and apparatus for performing antivirus tasks in a mobile wireless device
    • 用于在移动无线设备中执行防病毒任务的方法和装置
    • US07735138B2
    • 2010-06-08
    • US11126476
    • 2005-05-10
    • Xiaoming Zhao
    • Xiaoming Zhao
    • H04L29/06G06F21/00
    • H04L63/145G06F21/566H04W12/12
    • Disclosed are techniques for performing an antivirus task in a mobile wireless device running an embedded operating system. In one embodiment, calls intended for an application programming interface (API) function code is redirected to an antivirus function code. The redirection to the antivirus function code may be performed by modifying a kernel structure to point to a modified entry list instead of an API entry list. The redirection to the antivirus function code may also be performed by modifying the API function code to allow the antivirus function code to execute before the API function code. The kernel structure or the API function code may be properly restored back to its original form. Software implementations of these techniques may be readily loaded and unloaded, and may not require re-installation of the embedded operating system.
    • 公开了用于在运行嵌入式操作系统的移动无线设备中执行防病毒任务的技术。 在一个实施例中,用于应用程序编程接口(API)功能代码的调用被重定向到防病毒功能代码。 可以通过修改内核结构来指向修改的条目列表而不是API条目列表来执行对防病毒功能代码的重定向。 还可以通过修改API函数代码来执行对防病毒功能代码的重定向,以允许防病毒功能代码在API函数代码之前执行。 内核结构或API函数代码可以正确地恢复到原来的形式。 这些技术的软件实现可以容易地加载和卸载,并且可能不需要重新安装嵌入式操作系统。
    • 49. 发明申请
    • METHOD FOR RECOVERING LOST HEADER
    • 恢复失真头的方法
    • US20090154460A1
    • 2009-06-18
    • US11958014
    • 2007-12-17
    • Ruth A. VarelaJoseph E. BaumRonald V. GillisMary M. ValdiviaHania A. YassinXiaoming Zhao
    • Ruth A. VarelaJoseph E. BaumRonald V. GillisMary M. ValdiviaHania A. YassinXiaoming Zhao
    • H04L12/56
    • H04L69/04
    • A method is disclosed that includes sending (304) a first full header from a source compressor (106) to a destination decompressor (112) wherein the source compressor and the destination decompressor are a part of a symmetrical configuration. An IP packet including the full header is compressed into a first compressed header (310) based on the context established in the first full header. The first compressed header is sent (312) from the source compressor to the destination decompressor. The compressor receives (322) a second full header from the destination compressor wherein the second full header indicates that the destination decompressor did not receive the first full header. The second full header can include a modified field or has an incremented generation identification. The source compressor sends (336) another full header to the destination decompressor.
    • 公开了一种方法,其包括将来自源压缩器(106)的第一完整报头(304)发送(304)到目的地解压缩器(112),其中源压缩器和目的地解压缩器是对称配置的一部分。 基于在第一全标头中建立的上下文,包括完整报头的IP分组被压缩成第一压缩报头(310)。 第一个压缩报头从源压缩器发送(312)到目标解压缩器。 压缩器从目的地压缩机接收(322)第二个完整报头,其中第二个完整报头指示目的地解压缩器没有接收到第一个完整报头。 第二个完整报头可以包括一个修改的字段或者具有递增的生成标识。 源压缩器将另一个完整报头发送(336)到目标解压缩器。
    • 50. 发明申请
    • Portable secured computing environment for performing online confidential transactions in untrusted computers
    • 便携式安全计算环境,用于在不受信任的计算机中执行联机机密事务
    • US20080256536A1
    • 2008-10-16
    • US11786099
    • 2007-04-11
    • Xiaoming ZhaoGang ChenHeather Xing
    • Xiaoming ZhaoGang ChenHeather Xing
    • G06F9/455
    • G06F9/45537G06F21/57G06F21/575
    • A portable secured computing environment for performing online confidential transactions in an untrusted host computer. The secured computing environment may be loaded from a portable storage device, such as a USB stick, plugged into a peripheral port of the host computer. The secured computing environment may include a virtual machine running under a host operating system of the host computer. A secured operating system may be running in the virtual machine. An online application, such as a web browser in communication with an online service, may be run under the secured operating system. Operation of the online application may be restricted by a security profile. For example, the online application may only access network addresses specifically indicated in a whitelist of the security profile.
    • 用于在不受信任的主机中执行联机机密事务的便携式安全计算环境。 安全的计算环境可以从插入主计算机的外围端口的诸如USB棒的便携式存储设备加载。 安全的计算环境可以包括在主计算机的主机操作系统下运行的虚拟机。 安全的操作系统可能在虚拟机中运行。 诸如与在线服务通信的网络浏览器的在线应用可以在安全操作系统下运行。 在线应用程序的操作可能受到安全配置文件的限制。 例如,在线应用程序可能仅访问安全配置文件的白名单中明确指定的网络地址。