会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Changed file identification, software conflict resolution and unwanted file removal
    • 更改文件识别,软件冲突解决和不需要的文件删除
    • US07765592B2
    • 2010-07-27
    • US10830334
    • 2004-04-22
    • Yi-Min WangAaron R. JohnsonDavid C. LaddRoussi A. RoussevChad E. Verbowski
    • Yi-Min WangAaron R. JohnsonDavid C. LaddRoussi A. RoussevChad E. Verbowski
    • G06F21/00G06F12/14
    • G06F9/44505G06F8/65
    • As computer programs grow more complex, extensible, and connected, it becomes increasingly difficult for users to understand what has changed on their machines and what impact those changes have. An embodiment of the invention is described via a software tool, called AskStrider, that answers those questions by correlating volatile process information with persistent-state context information and change history. AskStrider scans a system for active components, matches them against a change log to identify recently updated and hence more interesting state, and searches for context information to help users understand the changes. Several real-world cases are provided to demonstrate the effectiveness of using AskStrider to quickly identify the presence of unwanted software, to determine if a software patch is potentially breaking an application, and to detect lingering components left over from an unclean uninstallation.
    • 随着计算机程序变得越来越复杂,可扩展和连接,用户越来越难以了解机器上发生了什么变化,以及这些更改有什么影响。 通过称为AskStrider的软件工具来描述本发明的实施例,其通过将易失性进程信息与持久状态上下文信息和变化历史相关联来回答这些问题。 AskStrider扫描系统中的活动组件,将其与更改日志进行匹配,以识别最近更新并因此更有趣的状态,并搜索上下文信息以帮助用户了解更改。 提供了几个真实案例来证明使用AskStrider快速识别不需要的软件的存在,确定软件补丁是否潜在地破坏应用程序,以及检测从不洁净卸载中遗留的剩余部件的有效性。
    • 5. 发明授权
    • Summary-based routing for content-based event distribution networks
    • 基于内容的事件分发网络的基于摘要的路由
    • US07200675B2
    • 2007-04-03
    • US10389623
    • 2003-03-14
    • Yi-Min WangLili QiuChad E. VerbowskiDemetrios AchlioptasGautam DasPer-Ake Larson
    • Yi-Min WangLili QiuChad E. VerbowskiDemetrios AchlioptasGautam DasPer-Ake Larson
    • G06F15/173G06F15/16
    • H04L29/06H04L12/1859H04L67/327H04L69/329
    • A system and method for enabling highly scalable multi-node event distribution networks through the use of summary-based routing, particularly event distribution networks using a content-based publish/subscribe model to distribute information. By allowing event routers to use imprecise summaries of the subscriptions hosted by matcher nodes, an event router can eliminate itself as a bottleneck thus improving overall event distribution network throughput even though the use of imprecise summaries results in some false positive event traffic. False positive event traffic is reduced by using a filter set partitioning that provides for good subscription set locality at each matcher node, while at the same time avoiding overloading any one matcher node. Good subscription set locality is maintained by routing new subscriptions to a matcher node with a subscription summary that best covers the new subscription. Where event space partitioning is desirable, an over-partitioning scheme is described that enables load balancing without repartitioning.
    • 一种通过使用基于摘要的路由,特别是使用基于内容的发布/订阅模型来分发信息的事件分发网络来实现高度可扩展的多节点事件分发网络的系统和方法。 通过允许事件路由器使用由匹配器节点托管的订阅的不精确的摘要,事件路由器可以将自身消除为瓶颈,从而改善整体事件分发网络吞吐量,即使使用不精确的摘要导致一些假阳性事件流量。 通过使用在每个匹配器节点处提供良好订阅集位置的过滤器集分割来减少假正事件流量,同时避免任何一个匹配器节点的过载。 通过将新的订阅路由到具有最佳覆盖新订阅的订阅摘要的匹配器节点来维护良好的订阅集位置。 在需要事件空间分区的情况下,描述了能够进行负载均衡而不进行重新分区的过分配方案。
    • 8. 发明授权
    • Systematic approach to uncover visual ambiguity vulnerabilities
    • 发现视觉模糊漏洞的系统方法
    • US08539585B2
    • 2013-09-17
    • US11768134
    • 2007-06-25
    • Shuo ChenRalf SasseJiahe Helen WangYi-Min Wang
    • Shuo ChenRalf SasseJiahe Helen WangYi-Min Wang
    • G06F21/00
    • G06F11/3608G06F21/577G06F21/83
    • To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    • 为了实现端到端的安全性,如果图形用户界面(GUI)的完整性受到损害,则传统的机器对机器的安全措施是不够的。 GUI逻辑缺陷是由GUI实现中的逻辑缺陷引起的一类软件漏洞。 这里描述的发明是使用系统推理方法揭露这些缺陷的技术。 该技术的主要步骤包括:(1)将视觉不变量映射到程序不变; (2)对程序逻辑,用户动作和执行上下文进行正式建模,并系统地探索违反程序不变的可能性; (3)根据探索找到真正的欺骗攻击。