会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Cache hint correction for security scanning
    • 缓存提示校正安全扫描
    • US07730533B1
    • 2010-06-01
    • US11282539
    • 2005-11-18
    • William E. SobelMark SpiegelBruce McCorkendale
    • William E. SobelMark SpiegelBruce McCorkendale
    • G06F11/30G06F11/00
    • G06F21/562
    • A computer includes a filter module providing a standardized interface for intercepting file access requests. The computer also includes a cache manager that manages the caching mode used with the requests. An application on the computer issues a file access request and explicitly or implicitly specifies a cache hint informing the cache manager of a desired caching mode. A security scanner module scans files on the computer for malicious software. The security scanner module intercepts a file access request and alters the caching mode, if necessary, to one optimized for security scanning. The security scanner module performs the file scan using the optimal caching mode, and, if necessary, resets the caching mode to its original state.
    • 计算机包括提供用于拦截文件访问请求的标准化接口的过滤器模块。 计算机还包括管理与请求一起使用的缓存模式的缓存管理器。 计算机上的应用程序发出文件访问请求,并显式或隐式地指定缓存提示,通知缓存管理器所需的缓存模式。 安全扫描器模块扫描计算机上的文件以获取恶意软件。 安全扫描器模块拦截文件访问请求,如果需要,将其改变为针对安全扫描进行优化的缓存模式。 安全扫描器模块使用最佳缓存模式执行文件扫描,如有必要,将缓存模式重置为原始状态。
    • 3. 发明授权
    • Heuristic detection and termination of fast spreading network worm attacks
    • 启发式检测和终止快速传播的网络蠕虫攻击
    • US07159149B2
    • 2007-01-02
    • US10280586
    • 2002-10-24
    • Mark SpiegelBruce McCorkendaleWilliam Sobel
    • Mark SpiegelBruce McCorkendaleWilliam Sobel
    • G06F11/00
    • H04L63/145G06F21/566
    • Methods, apparati, and computer program products for detecting and responding to fast-spreading network worm attacks include a network monitoring module (110), which observes (205) failed network connection attempts from multiple sources. A logging module (120) logs (220) the failed connection attempts. An analysis module (150) uses the logged data on the failed connection attempts to determine (225) whether a sources is infected with a worm using a set of threshold criteria. The threshold criteria indicate whether a source's failed connection attempts are non-normal. In one embodiment, a response module (160) responds (240) to the computer worm by, e.g., alerting a user or system administrator, terminating an infected process (20), or terminating the infected source's network access.
    • 用于检测和响应快速传播的网络蠕虫攻击的方法,装置和计算机程序产品包括网络监控模块(110),其观察(205)来自多个源的失败的网络连接尝试。 记录模块(120)记录(220)失败的连接尝试。 分析模块(150)使用失败连接尝试的记录数据来确定(225)源是否使用一组阈值标准感染蠕虫。 阈值标准指示源的失败连接尝试是否不正常。 在一个实施例中,响应模块(160)通过例如警告用户或系统管理员终止感染的进程(20)或终止被感染源的网络访问来响应(240)到计算机蠕虫。
    • 5. 发明授权
    • Opening computer files quickly and safely over a network
    • 通过网络快速,安全地打开计算机文件
    • US07484094B1
    • 2009-01-27
    • US10846100
    • 2004-05-14
    • John MillardMark Spiegel
    • John MillardMark Spiegel
    • H04L9/00
    • G06F21/562
    • Computer implemented methods, apparati, and computer-readable media for quickly and safely opening computer files over a network. In a method embodiment of the present invention, a local computer (10) initiates a test open of a file (14) associated with a remote computer (12) that is coupled to the local computer (10) over the network (15). When the test open discloses that the remote computer (12) has an acceptable malicious code scanning means (13), the local computer (10) performs an actual open of the file (14).
    • 计算机实现的方法,apparati和计算机可读介质,用于通过网络快速安全地打开计算机文件。 在本发明的方法实施例中,本地计算机(10)启动与通过网络(15)耦合到本地计算机(10)的远程计算机(12)相关联的文件(14)的测试打开。 当测试打开公开了远程计算机(12)具有可接受的恶意代码扫描装置(13)时,本地计算机(10)执行文件(14)的实际打开。