会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • End-to-end business integration testing tool
    • 端对端业务集成测试工具
    • US20050234845A1
    • 2005-10-20
    • US10821137
    • 2004-04-08
    • Foluso OkunseindeTyron Stading
    • Foluso OkunseindeTyron Stading
    • G06F7/00G06F11/36
    • G06F11/3684Y10S707/99931Y10S707/99932
    • A tool is provided for testing integration logic in a hub-and-spoke integration scheme. The testing tool exercises all spokes of the integration project for all objects in the model. A test document is sent to each adapter, which converts the generic objects to application specific objects and then converts the application specific objects back to generic objects. The testing tool then documents the return document of each spoke. The result is a catalog of total mappings, partial mappings, and empty mappings. These results may be analyzed to identify disagreements, lost data, and unused fields. The model may then be corrected by updating the mappings.
    • 提供了一种用于在集线器和辐射集成方案中测试集成逻辑的工具。 测试工具对模型中所有对象的整合项目执行所有轮辐。 测试文档被发送到每个适配器,它将通用对象转换为特定于应用程序的对象,然后将特定于应用程序的对象转换回通用对象。 然后,测试工具记录每个辐条的返回文件。 结果是总映射,部分映射和空映射的目录。 可以分析这些结果以识别不一致,丢失的数据和未使用的领域。 然后可以通过更新映射来更正模型。
    • 3. 发明申请
    • Method and apparatus for detecting password attacks using modeling techniques
    • 使用建模技术检测密码攻击的方法和装置
    • US20050015614A1
    • 2005-01-20
    • US10621928
    • 2003-07-17
    • Michael GilfixFoluso OkunseindeTyron Stading
    • Michael GilfixFoluso OkunseindeTyron Stading
    • G06F11/30G06F21/00
    • G06F21/31
    • Provided is an apparatus and method for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile, then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes are from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.
    • 提供了一种用于检测欺诈口令的装置和方法,使得计算机入侵尝试可以与授权用户不正确地输入其密码区分开来。 实际的密码与计算机键盘映射,结果数据存储在内存中。 将输入的密码的配置文件与存储的配置文件进行比较。 如果输入的密码的配置文件与存储的配置文件显着不同,则登录尝试将被标记为尝试的入侵。 在本发明的一个实施例中,密码根据随后的击键彼此之间的距离被映射。 不同的实施例可以具有不同的映射方案。 例如,映射数据可以对应于对应于当预期另一个角色时特定字符被错误地键入的可能性的统计数据。