会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • THREATS AND COUNTERMEASURES SCHEMA
    • 威胁和对策措施
    • US20070192344A1
    • 2007-08-16
    • US11382857
    • 2006-05-11
    • John MeierSrinath VasireddyMichael Dunner
    • John MeierSrinath VasireddyMichael Dunner
    • G06F7/00
    • G06F8/10G06F21/554
    • An threats and countermeasures schema that can incorporate expertise into an application engineering activity is provided. For example, a threats and countermeasures schema can be applied to a threat modeling component to converge knowledge into the activity by identifying categories, vulnerabilities, attacks and countermeasures based upon an application type, user objective, etc. The novel threats and countermeasures schema can create a common framework that converges knowledge with respect to any application engineering activity (e.g. threat modeling). For example, the schema can include lists of threats and attacks that can be acted upon. As well, the framework can include a list of novel countermeasures based upon the attacks. Additionally, a context precision mechanism can be employed to automatically and/or dynamically determine a context of an application environment. This context can be used to automatically generate an appropriate schema based upon the determined application type.
    • 提供了将专业知识纳入应用工程活动的威胁和对策模式。 例如,威胁和对策模式可以应用于威胁建模组件,以通过基于应用程序类型,用户目标等识别类别,漏洞,攻击和对策来将知识融合到活动中。新的威胁和对策模式可以创建 一个共同的框架,它将知识与任何应用工程活动(例如威胁建模)相融合。 例如,该模式可以包括可以执行的威胁和攻击的列表。 同样,框架可以包括基于攻击的新颖的对策的列表。 此外,可以采用上下文精确机制来自动和/或动态地确定应用环境的上下文。 该上下文可以用于基于确定的应用程序类型自动生成适当的模式。
    • 4. 发明申请
    • Information models and the application life cycle
    • 信息模型和应用生命周期
    • US20070157156A1
    • 2007-07-05
    • US11321153
    • 2005-12-29
    • John MeierAnandha MurukanSirnath VasireddyMichael Dunner
    • John MeierAnandha MurukanSirnath VasireddyMichael Dunner
    • G06F9/44
    • G06F21/554G06F8/10
    • An information model (e.g., schema) that can incorporate expertise into an application engineering activity—for example, a threats and countermeasures schema can be applied to a threat modeling component to converge knowledge into the activity by identifying categories, vulnerabilities, attacks and countermeasures. The novel schema can create a common framework that converges knowledge with respect to any application engineering activity (e.g., threat modeling, performance modeling). For example, the framework can include lists of threats and attacks that can be acted upon. As well, the framework can include a list of countermeasures based upon the attacks. Additionally, a context precision mechanism can be employed to automatically and/or dynamically determine a context of an application environment. This context can be used to automatically generate an appropriate schema or information model.
    • 可以将专业知识融入到应用工程活动中的信息模型(例如,模式) - 例如威胁和对策模式可以应用于威胁建模组件,以通过识别类别,漏洞,攻击和对策来将知识融合到活动中。 新颖的模式可以创建一个共同的框架,它将知识与任何应用程序工程活动(例如,威胁建模,性能建模)相融合。 例如,框架可以包括可以采取的威胁和攻击的列表。 同样,框架可以包括基于攻击的对策的列表。 此外,可以采用上下文精确机制来自动和/或动态地确定应用环境的上下文。 此上下文可用于自动生成适当的模式或信息模型。