会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • APPLICATION ATTACK MONITORING
    • 应用攻击监控
    • US20160099953A1
    • 2016-04-07
    • US14506991
    • 2014-10-06
    • Cedric HebertMohammad Ashiqur RahamanMichael Vogel
    • Cedric HebertMohammad Ashiqur RahamanMichael Vogel
    • H04L29/06
    • H04L63/1416H04L63/1433
    • Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions can include: obtaining a security graph model associated with an attack vulnerability of a distributed application, the security graph model comprising a plurality of rule parts; screening log data obtained by a plurality of connectors to selectively obtain relevant log data corresponding to one or more of the rule parts, each connector being in communication with a respective components of the distributed application; evaluating the relevant log data based on the security graph model to provide an evaluation score; and in response to determining that the evaluation score is greater than a predetermined threshold, providing output indicating an attack on the distributed application.
    • 本公开的实现包括用于提供应用程序攻击监视的方法,系统和计算机可读存储介质。 操作可以包括:获得与分布式应用的攻击脆弱性相关联的安全图模型,所述安全图模型包括多个规则部分; 筛选由多个连接器获得的日志数据,以选择性地获得对应于一个或多个规则部分的相关日志数据,每个连接器与分布式应用的相应部件通信; 基于安全图模型评估相关日志数据以提供评估分数; 并且响应于确定所述评估分数大于预定阈值,提供指示对所述分布式应用的攻击的输出。
    • 2. 发明授权
    • Application attack monitoring
    • 应用程序攻击监控
    • US09350749B2
    • 2016-05-24
    • US14506991
    • 2014-10-06
    • Cedric HebertMohammad Ashiqur RahamanMichael Vogel
    • Cedric HebertMohammad Ashiqur RahamanMichael Vogel
    • G06F11/00G06F12/14G06F12/16G08B23/00H04L29/06
    • H04L63/1416H04L63/1433
    • Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for providing application attack monitoring. Actions can include: obtaining a security graph model associated with an attack vulnerability of a distributed application, the security graph model comprising a plurality of rule parts; screening log data obtained by a plurality of connectors to selectively obtain relevant log data corresponding to one or more of the rule parts, each connector being in communication with a respective components of the distributed application; evaluating the relevant log data based on the security graph model to provide an evaluation score; and in response to determining that the evaluation score is greater than a predetermined threshold, providing output indicating an attack on the distributed application.
    • 本公开的实现包括用于提供应用程序攻击监视的方法,系统和计算机可读存储介质。 操作可以包括:获得与分布式应用的攻击脆弱性相关联的安全图模型,所述安全图模型包括多个规则部分; 筛选由多个连接器获得的日志数据,以选择性地获得对应于一个或多个规则部分的相关日志数据,每个连接器与分布式应用的相应部件通信; 基于安全图模型评估相关日志数据以提供评估分数; 并且响应于确定所述评估分数大于预定阈值,提供指示对所述分布式应用的攻击的输出。
    • 3. 发明申请
    • Providing Visualization of System Architecture
    • 提供系统架构的可视化
    • US20140372927A1
    • 2014-12-18
    • US13918101
    • 2013-06-14
    • Cedric HebertWihem ArsacGilles MontagnonJakub SendorElton Mathias
    • Cedric HebertWihem ArsacGilles MontagnonJakub SendorElton Mathias
    • G06F3/0484
    • G06F3/0484G06F9/451H04L41/22H04L43/0817
    • Techniques for managing a display of a system architecture include displaying a first visual representation of the system architecture that includes respective virtual representations of at least two components of the system architecture at a first level of detail; displaying a first virtual representation of a semantically relevant connector that extends between the two components of the system architecture at the first level of detail; receiving a request from a user to display a second visual representation of the system architecture; and generating a second visual representation of the system architecture for display, that includes respective virtual representations of the at least two components of the system architecture at a second level of detail different than the first level of detail, and a second virtual representation of the semantically relevant connector that extends between the at least two components of the system architecture at the second level of detail.
    • 用于管理系统架构的显示器的技术包括以第一级详细显示包括系统架构的至少两个组件的相应虚拟表示的系统体系结构的第一视觉表示; 显示在第一级细节上在系统架构的两个组件之间延伸的语义相关连接器的第一虚拟表示; 接收来自用户的请求以显示所述系统架构的第二视觉表示; 以及生成用于显示的系统架构的第二视觉表示,其包括不同于第一细节级别的第二细节级别的系统架构的至少两个组件的相应虚拟表示,以及语义的第二虚拟表示 相关连接器,其在第二级细节上在系统架构的至少两个部件之间延伸。
    • 5. 发明申请
    • Method and system for automatically controlling forum posting
    • 自动控制论坛发帖的方法和系统
    • US20070143403A1
    • 2007-06-21
    • US11639989
    • 2006-12-15
    • Cedric UlmerLaurent GomezCedric HebertPascal Spadone
    • Cedric UlmerLaurent GomezCedric HebertPascal Spadone
    • G06F15/16
    • G06F17/277H04L12/1822H04L63/0227
    • A method, for automatically controlling a data submission in a forum, the control being based on the respective data content, comprises: the data content submitted by a user for the forum is automatically parsed with respect to specifically selected characters, the selected characters being provided together with respective selection ancillary information, if any selected character is found within the data content, the respective selection ancillary information is analyzed, the data is handled conformable with the analyzed respective selection ancillary information, an answer for the user is elaborated, the answer including the respective found character together with an appropriate analysis of its selection ancillary information and informing the user about the manner the data is handled, and the elaborated answer is communicated to the user.
    • 一种用于在论坛中自动控制数据提交的方法,所述控件基于相应的数据内容,包括:由用户为论坛提交的数据内容相对于特定选择的字符被自动解析,所提供的所选字符 以及相应的选择辅助信息,如果在数据内容中找到任何所选择的字符,则分析各个选择辅助信息,处理数据与所分析的各个选择辅助信息一致,详细说明用户的答案,答案包括 各自发现的字符以及其选择辅助信息的适当分析,并向用户通知数据的处理方式,并将详细的答案传达给用户。
    • 10. 发明申请
    • Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system
    • 用于在分散式网络系统内的分布式工作流管理系统中安全执行工作流任务的方法和系统
    • US20090077376A1
    • 2009-03-19
    • US12098012
    • 2008-04-04
    • Frederic MontagutLaurent GomezCedric HebertCedric Ulmer
    • Frederic MontagutLaurent GomezCedric HebertCedric Ulmer
    • H04L9/30H04L9/08H04L9/32
    • G06F21/64G06F21/62G06F21/6209
    • There are provided a method, a system and an initiator server for a secure execution of workflow tasks of a workflow to be executed according to a given execution pattern in a distributed workflow management system within a decentralized network system with a plurality of servers (b0, b1, . . . , bn) including at least an initiator server and at least a number of groups of servers of the plurality of servers. Each group satisfies a policy (poli) of a vertex, and thus, knows a corresponding policy key pair including a policy private key (SKpoli) and a policy public key (PKpoli), respectively. Each vertex denotes a set of workflow tasks to be executed in accord with the execution pattern and is assigned a vertex key pair including a vertex private key and a vertex public key. The vertex private keys and the policy public keys are jointly encrypted within a first onion structure, the first onion structure being built up of a number of onion layers representing the execution pattern which defines a succession of vertices such that each layer is decryptable by using the policy private key of exactly one vertex thus revealing the corresponding vertex private key.
    • 提供了一种方法,系统和发起者服务器,用于在具有多个服务器的分散式网络系统内的分布式工作流管理系统中根据给定的执行模式执行要执行的工作流的工作流任务的安全执行(b0, b1,...,bn)至少包括发起者服务器和所述多个服务器中的至少多个服务器组。 每个组满足顶点的策略(poli),并且因此分别知道包括策略私钥(SKpoli)和策略公钥(PKpoli)的相应策略密钥对。 每个顶点表示要根据执行模式执行的一组工作流任务,并分配一个包括顶点私钥和顶点公钥的顶点密钥对。 顶点私钥和策略公钥在第一洋葱结构内共同加密,第一洋葱结构由多个洋葱层构成,表示执行模式,其定义了一系列顶点,使得每个层可通过使用 恰好一个顶点的策略私​​钥因此显示相应的顶点私钥。