会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
    • 方法,计算机程序产品和数据结构,用于入侵检测,入侵响应和目标计算机系统中的漏洞补救
    • US08458793B2
    • 2013-06-04
    • US10890798
    • 2004-07-13
    • John J. McKenna
    • John J. McKenna
    • G06F11/00
    • G06F21/55G06F21/577
    • Computer security threat management information is generated by receiving a notification of a security threat and/or a notification of a test that detects intrusion of a computer security threat. A computer-actionable TMV is generated from the notification that was received. The TMV includes a computer-readable field that provides identification of at least one system type that is effected by the computer security threat, a computer-readable field that provides identification of a release level for a system type, and a computer-readable field that provides identification of the test that detects intrusion of the computer security threat for a system type and a release level, a computer-readable field that provides identification of a method to reverse the intrusion exploit of the computer security threat for a system type and a release level, and a computer-readable field that provides identification of a method to remediate the vulnerability subject to exploit of the computer security threat for a system type and a release level. The TMV is transmitted to target systems for processing by the target systems.
    • 计算机安全威胁管理信息是通过接收安全威胁的通知和/或检测入侵计算机安全威胁的测试的通知来生成的。 计算机可操作的TMV是从收到的通知生成的。 TMV包括提供由计算机安全威胁影响的至少一种系统类型的识别的计算机可读字段,提供用于系统类型的发布级别的标识的计算机可读字段以及计算机可读字段,该计算机可读字段 提供检测对系统类型和发行级别的计算机安全威胁的入侵的测试的识别,计算机可读字段,其提供用于反转用于系统类型和发行版的计算机安全威胁的入侵利用的方法的标识 级别和计算机可读字段,其提供用于修复受到系统类型和发布级别的计算机安全威胁的利用的易受攻击的方法的标识。 TMV被传送到目标系统进行目标系统的处理。
    • 6. 发明申请
    • METHOD OF INTEGRATING A SECURITY OPERATIONS POLICY INTO A THREAT MANAGEMENT VECTOR
    • 将安全运行政策纳入威胁管理向量的方法
    • US20080263664A1
    • 2008-10-23
    • US11736068
    • 2007-04-17
    • John J. McKenna
    • John J. McKenna
    • G06F12/14
    • H04L63/1408G06F21/577G06F2221/2101H04L63/20
    • The invention relates to the integration of a security operations policy into a threat management vector. In one embodiment, a method according to the invention includes receiving at least one threat management vector (TMV) from a TMV generator, the TMV including a root vulnerability vector, at least one system vector, at least one system level vector, and a countermeasures payload including intrusion detection countermeasures (IDC), intrusion response countermeasures (IRC), and vulnerability remediation countermeasures (VRC); forwarding to the TMDC a TMV including only the root vulnerability vector, the at least one system vector, and the at least one system level vector; propagating the TMV through a hierarchy of policy mediation regions (PMRs), each PMR being operable to refine at least one of the IDC, the IRC, and the VRC; refining at least one of the IDC, the IRC, and the VRC to conform to a security operations policy of the PMR; forwarding the refined TMV to a threat management domain controller (TMDC); recording refinements made by each PMR to each of the IDC, the IRC, and the VRC; transferring the recorded refinements to a threat management control book (TMCB); and marking the refined TMV as having been refined by each PMR making a refinement.
    • 本发明涉及将安全操作策略集成到威胁管理向量中。 在一个实施例中,根据本发明的方法包括从TMV生成器接收至少一个威胁管理向量(TMV),所述TMV包括根漏洞向量,至少一个系统向量,至少一个系统级向量和对策 有效载荷包括入侵检测对策(IDC),入侵响应对策(IRC)和脆弱性补救对策(VRC); 向TMDC转发仅包括根漏洞向量,至少一个系统向量和至少一个系统级向量的TMV; 通过策略中介区域(PMR)的层次来传播TMV,每个PMR可操作以精化IDC,IRC和VRC中的至少一个; 完善IDC,IRC和VRC中的至少一个,以符合PMR的安全操作策略; 将精简的TMV转发到威胁管理域控制器(TMDC); 记录由每个PMR对IDC,IRC和VRC进行的改进; 将记录的优化转移到威胁管理控制簿(TMCB); 并且将精细的TMV标记为由每个PMR进行改进以进行细化。
    • 7. 发明授权
    • In-place index compression
    • 就地索引压缩
    • US4507752A
    • 1985-03-26
    • US468815
    • 1983-02-22
    • John J. McKennaJohn M. Thompson
    • John J. McKennaJohn M. Thompson
    • G06F17/30G06F1/00
    • G06F17/30958Y10S707/99942
    • The present invention provides in a data processing system storing a plurality of discrete entities, each identified by a single parameter within a monotonic parameter spectrum, resident at an addressable location and locatable by searching a system maintained hierarchical index mapping parameters onto location addresses, a method of compressing the index by the system, which method is interruptable to permit valid searching of the index and executes in a variable length ordered sequence of processing cycles, each comprising a variable length sequence of two part iterations, each iteration comprising the selective performance of each of an ordered fixed sequence of basic operations, wherein each full cycle initially operates on successive index levels in the direction opposite to that in which the index is searched while performing the first part of each iteration and thereafter operates on successive levels in the reverse direction performing the second part of each iteration, parameter relocation at a level being performed by duplicating a parameter at its target location in a first part of the iteration at that level and deleting the original presence of the parameter in the second part of that iteration.
    • 本发明提供一种数据处理系统,其存储多个离散实体,每个离散实体各自由单调参数在单调参数频谱内识别,驻留在可寻址位置,并且可通过将维护的分层索引映射参数的系统搜索到位置地址来定位;方法 通过系统压缩索引,该方法是可中断的,以允许索引的有效搜索并以可变长度有序的处理周期序列执行,每个序列包括两部分迭代的可变长度序列,每个迭代包括每个 基本操作的有序固定序列,其中每个完整循环首先在执行每次迭代的第一部分时在与索引搜索的方向相反的方向上的连续索引级上进行操作,然后在反向执行的连续级上进行操作 每次迭代的第二部分,参数 通过在该级别的迭代的第一部分中在其目标位置处复制参数来执行该级别的重定位,并且在该迭代的第二部分中删除参数的原始存在。
    • 8. 发明授权
    • Method of integrating a security operations policy into a threat management vector
    • 将安全操作策略集成到威胁管理向量中的方法
    • US07770203B2
    • 2010-08-03
    • US11736068
    • 2007-04-17
    • John J. McKenna
    • John J. McKenna
    • H04L29/06G06F21/00
    • H04L63/1408G06F21/577G06F2221/2101H04L63/20
    • The invention relates to the integration of a security operations policy into a threat management vector. In one embodiment, a method according to the invention includes receiving at least one threat management vector (TMV) from a TMV generator, the TMV including a root vulnerability vector, at least one system vector, at least one system level vector, and a countermeasures payload including intrusion detection countermeasures (IDC), intrusion response countermeasures (IRC), and vulnerability remediation countermeasures (VRC); forwarding to the TMDC a TMV including only the root vulnerability vector, the at least one system vector, and the at least one system level vector; propagating the TMV through a hierarchy of policy mediation regions (PMRs), each PMR being operable to refine at least one of the IDC, the IRC, and the VRC; refining at least one of the IDC, the IRC, and the VRC to conform to a security operations policy of the PMR; forwarding the refined TMV to a threat management domain controller (TMDC); recording refinements made by each PMR to each of the IDC, the IRC, and the VRC; transferring the recorded refinements to a threat management control book (TMCB); and marking the refined TMV as having been refined by each PMR making a refinement.
    • 本发明涉及将安全操作策略集成到威胁管理向量中。 在一个实施例中,根据本发明的方法包括从TMV生成器接收至少一个威胁管理向量(TMV),所述TMV包括根漏洞向量,至少一个系统向量,至少一个系统级向量和对策 有效载荷包括入侵检测对策(IDC),入侵响应对策(IRC)和脆弱性补救对策(VRC); 向TMDC转发仅包括根漏洞向量,至少一个系统向量和至少一个系统级向量的TMV; 通过策略中介区域(PMR)的层次来传播TMV,每个PMR可操作以精化IDC,IRC和VRC中的至少一个; 完善IDC,IRC和VRC中的至少一个,以符合PMR的安全操作策略; 将精简的TMV转发到威胁管理域控制器(TMDC); 记录由每个PMR对IDC,IRC和VRC进行的改进; 将记录的优化转移到威胁管理控制簿(TMCB); 并且将精细的TMV标记为由每个PMR进行改进以进行细化。