会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Computer security threat data collection and aggregation with user privacy protection
    • 计算机安全威胁数据采集和聚合与用户隐私保护
    • US09043587B1
    • 2015-05-26
    • US13542445
    • 2012-07-05
    • Yi-Fen ChenShuosen Robert Liu
    • Yi-Fen ChenShuosen Robert Liu
    • H04L29/06G06F21/55
    • G06F21/552G06F21/56H04L63/045H04L63/1408H04L63/20
    • An endpoint computer in an enterprise network is configured to detect computer security threat events, such as presence of a computer virus. Upon detection of a threat event, the endpoint computer generates computer security threat data for the threat event. The threat data may include user identifiable data that can be used to identify a user in the enterprise network. The endpoint computer encrypts the user identifiable data prior to sending the threat data to a smart protection network or to an enterprise server where threat data from various enterprise networks are collected for analysis. The endpoint computer may also encrypt an identifier for the threat data and provide the encrypted identifier to the smart protection network and to an enterprise server in the enterprise network. The enterprise server may use the encrypted identifier to retrieve the threat data from the smart protection network to generate user-specific reports.
    • 企业网络中的端点计算机被配置为检测计算机安全威胁事件,例如计算机病毒的存在。 在检测到威胁事件后,端点计算机生成威胁事件的计算机安全威胁数据。 威胁数据可以包括可用于识别企业网络中的用户的用户可识别数据。 端点计算机在将威胁数据发送到智能保护网络或收集来自各种企业网络的威胁数据用于分析的企业服务器之前对用户可识别数据进行加密。 端点计算机还可以加密威胁数据的标识符,并将加密的标识符提供给智能保护网络和企业网络中的企业服务器。 企业服务器可以使用加密的标识符来从智能保护网络检索威胁数据,以生成用户特定的报告。
    • 7. 发明授权
    • Migration of computer security modules in a virtual machine environment
    • 在虚拟机环境中迁移计算机安全模块
    • US08661434B1
    • 2014-02-25
    • US12536222
    • 2009-08-05
    • Yung-Chang LiangYi-Fen Chen
    • Yung-Chang LiangYi-Fen Chen
    • G06F9/455
    • G06F9/45558
    • A machine in the form of a computer is configured to run virtual machines. A virtual machine migrated from another computer is run in the computer. A security profile of the migrated virtual machine in the computer indicates a configuration setting of another network component in another computer network. A network profile in the computer indicates a configuration setting of a network component in the current computer network. The security profile of the migrated virtual machine is automatically updated to reflect the configuration setting of the network component in the current computer network to provide computer security function in the current computer network.
    • 计算机形式的机器配置为运行虚拟机。 从另一台计算机迁移的虚拟机在计算机中运行。 计算机中迁移的虚拟机的安全配置文件指示另一个计算机网络中另一个网络组件的配置设置。 计算机中的网络配置文件指示当前计算机网络中的网络组件的配置设置。 迁移的虚拟机的安全配置文件将自动更新,以反映当前计算机网络中网络组件的配置设置,以便在当前计算机网络中提供计算机安全功能。