会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • APPARATUS AND METHOD FOR CHECKING PC SECURITY
    • 检查PC安全的装置和方法
    • US20090293100A1
    • 2009-11-26
    • US12203974
    • 2008-09-04
    • Jung Min KANGKang San KIMDo Hoon LEE
    • Jung Min KANGKang San KIMDo Hoon LEE
    • G06F17/10
    • G06F21/57
    • Provided are an apparatus and method for checking Personal Computer (PC) security. The apparatus includes a check module for checking a security configuration of a PC on the basis of a check policy received from a security check server and outputting check results, and a control module for changing the security configuration of the PC on the basis of a control policy received from the security check server and the check results received from the check module. According to the apparatus, a security check agent installed in each PC performs security check and changes a security configuration according to a control policy, such that the security configurations of PCs in a network can be managed collectively.
    • 提供了一种用于检查个人计算机(PC)安全性的装置和方法。 该装置包括:检查模块,用于基于从安全检查服务器接收的检查策略和输出检查结果来检查PC的安全配置,以及控制模块,用于基于控制来改变PC的安全配置 从安全检查服务器收到的策略和从检查模块接收到的检查结果。 根据该装置,安装在每个PC中的安全检查代理进行安全检查,并根据控制策略改变安全配置,使得可以集中管理网络中的PC的安全配置。
    • 3. 发明申请
    • METHOD AND APPARATUS FOR PROVIDING PHISHING AND PHARMING ALERTS
    • 提供检验和药物警报的方法和装置
    • US20090055928A1
    • 2009-02-26
    • US12056375
    • 2008-03-27
    • Jung Min KANGDo Hoon LEEEng Ki PARKChoon Sik PARK
    • Jung Min KANGDo Hoon LEEEng Ki PARKChoon Sik PARK
    • G06F21/00
    • H04L63/1475G06F21/554G06F2221/2119H04L63/168
    • Provided is an Internet information security technique, and more particularly, a method for alerting a user that a connected web site is a phishing site by comparing connected web site information with normal site information.To this end, the method includes the steps of: (a) extracting information on a presently connected site; (b) if information on a normal site having the same domain as the connected site exists in a database, comparing the connected site information with the normal site information; and (c) if the connected site information does not match the normal site information, alerting a user that the connected site is a phishing site. Therefore, the user may safely use the Internet by confirming whether the connected web site is a phishing site.
    • 提供了一种互联网信息安全技术,更具体地,涉及通过将连接的网站信息与正常的站点信息进行比较来提醒用户连接的网站是钓鱼网站的方法。 为此,该方法包括以下步骤:(a)提取当前连接的站点的信息; (b)如果在数据库中存在与连接站点具有相同域的正常站点的信息,则将所连接的站点信息与正常站点信息进行比较; 和(c)如果所连接的站点信息与正常站点信息不匹配,则提醒用户该连接站点是钓鱼站点。 因此,用户可以通过确认所连接的网站是否是网络钓鱼站点来安全地使用因特网。
    • 4. 发明申请
    • APPARATUS AND METHOD FOR PREVENTING ANOMALY OF APPLICATION PROGRAM
    • 防止应用程序异常的装置和方法
    • US20090313699A1
    • 2009-12-17
    • US12332012
    • 2008-12-10
    • In Sook JANGEun Young LEEHyung Geun OHDo Hoon LEE
    • In Sook JANGEun Young LEEHyung Geun OHDo Hoon LEE
    • G06F11/30G06F21/22
    • G06F21/554G06F21/52
    • An apparatus and method for preventing an anomaly of an application program are provided. More particularly, an apparatus and method for preventing an anomaly of an application program that detect and stop an anomaly on the basis of a behavior profile for an application program are provided. The apparatus includes a behavior monitor that detects behavior of an application program in operation, an anomaly detector that determines whether the detected behavior of the application program is an anomaly on the basis of a behavior profile of the application program in operation, and an anomaly stopper that stops the behavior of the application program determined as an anomaly by the anomaly detector. Possible application program behavior is stored according to its purpose in a behavior profile and an anomaly is detected and stopped on the basis of the behavior profile, thereby decreasing a false-positive rate of anomaly detection and simultaneously solving a problem of a conventional security programs being incapable of defending against attacks using the authority of a program trusted by a user.
    • 提供一种用于防止应用程序的异常的装置和方法。 更具体地,提供一种用于防止基于应用程序的行为特征来检测和停止异常的应用程序的异常的装置和方法。 该装置包括:行为监视器,其检测运行中的应用程序的行为;异常检测器,其基于运行中的应用程序的行为特征来确定检测到的应用程序的行为是否为异常;异常阻塞 这阻止由异常检测器确定为异常的应用程序的行为。 可能的应用程序行为根据其目的存储在行为配置文件中,并且基于行为配置文件检测和停止异常,从而减少异常检测的假阳性率并同时解决常规安全程序的问题 不能使用用户信任的程序的权限来防御攻击。
    • 6. 发明申请
    • METHOD AND APPARATUS FOR DIGITAL FORENSICS
    • 数字法人的方法与装置
    • US20090299935A1
    • 2009-12-03
    • US12252869
    • 2008-10-16
    • Young Han CHOITae Ghyoon KIMHyung Geun OHDo Hoon LEE
    • Young Han CHOITae Ghyoon KIMHyung Geun OHDo Hoon LEE
    • G06N5/02G06F12/06
    • G06K9/00
    • A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file.
    • 提供了一种用于数字取证的方法和装置。 用于数字取证的装置包括用于提取存储在目标存储介质中的页面文件的页面文件提取器,用于提取存储在所提取的页面文件中的页面的特征的存储页面特征提取器,用于将提取的特征提取的页面分类器 具有至少一个预定分类标准的页面,并根据比较结果分类页面;以及数字取证单元,用于根据分类页面进行数字取证。 根据该方法和装置,可以仅使用页面文件的信息来执行数字取证。
    • 8. 发明申请
    • METHOD AND APPARATUS FOR ANALYZING EXPLOIT CODE IN NONEXECUTABLE FILE USING VIRTUAL ENVIRONMENT
    • 使用虚拟环境分析不可转让文件中的开发代码的方法和装置
    • US20090094585A1
    • 2009-04-09
    • US12056434
    • 2008-03-27
    • Young Han CHOIHyoung Chun KIMDo Hoon LEE
    • Young Han CHOIHyoung Chun KIMDo Hoon LEE
    • G06F9/44
    • G06F9/455G06F21/566
    • Provided is a method and apparatus for analyzing an exploit code included in a nonexecutable file using a target program with vulnerability in a virtual environment. The method includes the steps of: loading a nonexecutable file including the exploit code by a target program, the target program being executed in a virtual environment and includes vulnerability; analyzing a register value of the target program and determining if the register value of the target program indicates a normal code region; storing log information on operation of the target program when the register value indicates a region other than the normal code region; and extracting and analyzing the exploit code included in the nonexecutable file based on the stored log information. In this method, the exploit code is analyzed in the virtual environment, thereby preventing damage caused by execution of the exploit code.
    • 提供了一种用于使用在虚拟环境中具有脆弱性的目标程序来分析包含在不可执行文件中的利用代码的方法和装置。 该方法包括以下步骤:通过目标程序加载包括漏洞利用码的不可执行文件,目标程序在虚拟环境中执行,并且包括漏洞; 分析目标程序的寄存器值,并确定目标程序的寄存器值是否指示正常代码区; 当所述寄存器值指示除了所述正常代码区域之外的区域时,存储关于所述目标程序的操作的日志信息; 并且基于存储的日志信息提取和分析包括在不可执行文件中的利用代码。 在这种方法中,在虚拟环境中分析漏洞代码,从而防止由执行漏洞利用代码造成的损害。
    • 10. 发明申请
    • SYSTEM AND METHOD FOR MANAGING NETWORK BY VALUE-BASED ESTIMATION
    • 通过基于价值的估计来管理网络的系统和方法
    • US20080313701A1
    • 2008-12-18
    • US12039858
    • 2008-02-29
    • Young Han CHOIHyoung Chun KIMTae Ghyoon KIMDo Hoon LEEEungki PARK
    • Young Han CHOIHyoung Chun KIMTae Ghyoon KIMDo Hoon LEEEungki PARK
    • G06F15/173G06F21/00
    • H04L41/0893
    • A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    • 提供了一种通过基于价值的估计来管理网络的系统和方法。 请求通信的网络设备被定义为活动点,并且接收通信请求的网络设备被定义为被动点。 根据连接到相应网络设备的活动点的数量来确定网络设备的值,并且基于网络设备通过的值来确定处于网络设备之间的通信路径中的网络设备的值 通过相应的网络设备。 当在网络设备的值已被估计的状态下转移网络环境的策略时,基于网络设备的估计值执行策略冲突测试,从而确定策略的应用 考虑网络设备的价值和意义。