会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Collecting and analyzing malware data
    • 收集和分析恶意软件数据
    • US08667583B2
    • 2014-03-04
    • US12234717
    • 2008-09-22
    • Alexey PolyakovMarc SeinfeldJigar J. ModyNing SunTony LeeChengyun Chu
    • Alexey PolyakovMarc SeinfeldJigar J. ModyNing SunTony LeeChengyun Chu
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • G06F21/552G06F21/568
    • A malware analysis system is described that provides information about malware execution history on a client computer and allows automated back-end analysis for faster creation of identification signatures and removal instructions. The malware analysis system collects threat information on client computers and sends the threat information to a back-end analysis component for automated analysis. The back-end analysis component analyzes the threat information by comparing the threat information to information about known threats. The system builds a signature for identifying the threat family and a mitigation script for neutralizing the threat. The system sends the signature and mitigation data to client computers, which use the information to mitigate the threat. Thus, the malware analysis system detects and mitigates threats more quickly than previous systems by reducing the burden on technicians to manually create environments for reproducing the threats and manually analyze the threat behavior.
    • 描述了恶意软件分析系统,其提供关于客户端计算机上的恶意软件执行历史的信息,并允许自动后端分析,以更快地创建身份签名和删除指令。 恶意软件分析系统在客户端计算机上收集威胁信息,并将威胁信息发送到后端分析组件进行自动分析。 后端分析组件通过将威胁信息与已知威胁信息进行比较来分析威胁信息。 该系统构建一个用于识别威胁系列的签名和用于中和威胁的缓解脚本。 系统将签名和缓解数据发送到客户端计算机,客户端计算机使用该信息来减轻威胁。 因此,恶意软件分析系统通过减轻技术人员手动创建用于再现威胁的环境并手动分析威胁行为的负担,可以更快地检测和减轻威胁。
    • 2. 发明申请
    • COLLECTING AND ANALYZING MALWARE DATA
    • 收集和分析恶意软件数据
    • US20100077481A1
    • 2010-03-25
    • US12234717
    • 2008-09-22
    • Alexey PolyakovMarc SeinfeldJigar J. ModyNing SunTony LeeChengyun Chu
    • Alexey PolyakovMarc SeinfeldJigar J. ModyNing SunTony LeeChengyun Chu
    • G06F21/00
    • G06F21/552G06F21/568
    • A malware analysis system is described that provides information about malware execution history on a client computer and allows automated back-end analysis for faster creation of identification signatures and removal instructions. The malware analysis system collects threat information on client computers and sends the threat information to a back-end analysis component for automated analysis. The back-end analysis component analyzes the threat information by comparing the threat information to information about known threats. The system builds a signature for identifying the threat family and a mitigation script for neutralizing the threat. The system sends the signature and mitigation data to client computers, which use the information to mitigate the threat. Thus, the malware analysis system detects and mitigates threats more quickly than previous systems by reducing the burden on technicians to manually create environments for reproducing the threats and manually analyze the threat behavior.
    • 描述了恶意软件分析系统,其提供关于客户端计算机上的恶意软件执行历史的信息,并允许自动后端分析,以更快地创建身份签名和删除指令。 恶意软件分析系统在客户端计算机上收集威胁信息,并将威胁信息发送到后端分析组件进行自动分析。 后端分析组件通过将威胁信息与已知威胁信息进行比较来分析威胁信息。 该系统构建一个用于识别威胁系列的签名和用于中和威胁的缓解脚本。 系统将签名和缓解数据发送到客户端计算机,客户端计算机使用该信息来减轻威胁。 因此,恶意软件分析系统通过减轻技术人员手动创建用于再现威胁的环境并手动分析威胁行为的负担,可以更快地检测和减轻威胁。
    • 3. 发明授权
    • Classification of malware using clustering that orders events in accordance with the time of occurance
    • 使用根据发生时间对事件进行排序的群集进行恶意软件分类
    • US07809670B2
    • 2010-10-05
    • US11608625
    • 2006-12-08
    • Tony LeeJigar J. ModyYing Lena LinAdrian M. MarinescuAlexey A. Polyakov
    • Tony LeeJigar J. ModyYing Lena LinAdrian M. MarinescuAlexey A. Polyakov
    • G06F17/00
    • G06F21/564
    • The present invention is directed to a method and system for automatically classifying an application into an application group which is previously classified in a knowledge base. More specifically, a runtime behavior of an application is captured as a series of events which are monitored and recorded during the execution of the application. The series of events are analyzed to find a proper application group which shares common runtime behavior patterns with the application. The knowledge base of application groups is previously constructed based on a large number of sample applications. The construction of the knowledge base is done in such a manner that each sample application can be classified into application groups based on a set of classification rules in the knowledge base. The set of classification rules are applied to a new application in order to classify the new application into one of the application groups.
    • 本发明涉及一种将应用程序自动分类为先前分类为知识库的应用组的方法和系统。 更具体地,应用程序的运行时行为被捕获为在应用程序的执行期间被监视和记录的一系列事件。 分析一系列事件,以找到与应用程序共享公共运行时行为模式的正确应用程序组。 基于大量示例应用程序,先前构建了应用程序组的知识库。 基于知识库中的一组分类规则,完成知识库的构建,使得每个样本应用程序可以分类为应用组。 将一组分类规则应用于新应用程序,以便将新应用程序分类到其中一个应用程序组中。
    • 5. 发明授权
    • Whitelist and blacklist identification data
    • 白名单和黑名单识别数据
    • US08214895B2
    • 2012-07-03
    • US11861489
    • 2007-09-26
    • Chengi Jimmy KuoJigar J. Mody
    • Chengi Jimmy KuoJigar J. Mody
    • H04L29/06
    • G06F21/564
    • Aspects of the subject matter described herein relate to identifying good files and malware based on whitelists and blacklists. In aspects, a node starts a scan of files on a data store. In conjunction with starting the scan, the node creates a data structure that indicates the directories on the data store. The node sends the data structure to a whitelist server and a blacklist server and an indication of a last successful time of communication. The whitelist and blacklist servers respond to the node with information about any new files that have been added to the directories since the last successful communication. The node may subsequently use the information to identify known good files and malware.
    • 本文描述的主题的方面涉及基于白名单和黑名单来识别良好文件和恶意软件。 在方面,节点开始对数据存储上的文件进行扫描。 结合开始扫描,节点创建一个数据结构,指示数据存储上的目录。 节点将数据结构发送到白名单服务器和黑名单服务器,并指示最后一次成功通信时间。 白名单和黑名单服务器响应节点,其中包含自上次成功通信以来添加到目录中的任何新文件的信息。 节点可以随后使用该信息来识别已知的良好文件和恶意软件。
    • 7. 发明申请
    • Whitelist and Blacklist Identification Data
    • 白名单和黑名单识别数据
    • US20090083852A1
    • 2009-03-26
    • US11861489
    • 2007-09-26
    • Chengi Jimmy KuoJigar J. Mody
    • Chengi Jimmy KuoJigar J. Mody
    • G06F11/00
    • G06F21/564
    • Aspects of the subject matter described herein relate to identifying good files and malware based on whitelists and blacklists. In aspects, a node starts a scan of files on a data store. In conjunction with starting the scan, the node creates a data structure that indicates the directories on the data store. The node sends the data structure to a whitelist server and a blacklist server and an indication of a last successful time of communication. The whitelist and blacklist servers respond to the node with information about any new files that have been added to the directories since the last successful communication. The node may subsequently use the information to identify known good files and malware.
    • 本文描述的主题的方面涉及基于白名单和黑名单来识别良好文件和恶意软件。 在方面,节点开始对数据存储上的文件进行扫描。 结合开始扫描,节点创建一个数据结构,指示数据存储上的目录。 节点将数据结构发送到白名单服务器和黑名单服务器,并指示最后一次成功通信时间。 白名单和黑名单服务器响应节点,其中包含自上次成功通信以来添加到目录中的任何新文件的信息。 节点可以随后使用该信息来识别已知的良好文件和恶意软件。