会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • SYSTEM AND METHOD FOR MANAGING NETWORK BY VALUE-BASED ESTIMATION
    • 通过基于价值的估计来管理网络的系统和方法
    • US20080313701A1
    • 2008-12-18
    • US12039858
    • 2008-02-29
    • Young Han CHOIHyoung Chun KIMTae Ghyoon KIMDo Hoon LEEEungki PARK
    • Young Han CHOIHyoung Chun KIMTae Ghyoon KIMDo Hoon LEEEungki PARK
    • G06F15/173G06F21/00
    • H04L41/0893
    • A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
    • 提供了一种通过基于价值的估计来管理网络的系统和方法。 请求通信的网络设备被定义为活动点,并且接收通信请求的网络设备被定义为被动点。 根据连接到相应网络设备的活动点的数量来确定网络设备的值,并且基于网络设备通过的值来确定处于网络设备之间的通信路径中的网络设备的值 通过相应的网络设备。 当在网络设备的值已被估计的状态下转移网络环境的策略时,基于网络设备的估计值执行策略冲突测试,从而确定策略的应用 考虑网络设备的价值和意义。
    • 4. 发明申请
    • METHOD AND APPARATUS FOR DIGITAL FORENSICS
    • 数字法人的方法与装置
    • US20090299935A1
    • 2009-12-03
    • US12252869
    • 2008-10-16
    • Young Han CHOITae Ghyoon KIMHyung Geun OHDo Hoon LEE
    • Young Han CHOITae Ghyoon KIMHyung Geun OHDo Hoon LEE
    • G06N5/02G06F12/06
    • G06K9/00
    • A method and apparatus for digital forensics are provided. The apparatus for digital forensics includes a page file extractor for extracting a page file stored in a target storage medium, a stored-page feature extractor for extracting features of pages stored in the extracted page file, a page classifier for comparing the extracted features of the pages with at least one predetermined classification criterion and classifying the pages according to the comparison results, and a digital forensics unit for performing digital forensics according to the classified pages. According to the method and apparatus, it is possible to perform digital forensics using only information of a page file.
    • 提供了一种用于数字取证的方法和装置。 用于数字取证的装置包括用于提取存储在目标存储介质中的页面文件的页面文件提取器,用于提取存储在所提取的页面文件中的页面的特征的存储页面特征提取器,用于将提取的特征提取的页面分类器 具有至少一个预定分类标准的页面,并根据比较结果分类页面;以及数字取证单元,用于根据分类页面进行数字取证。 根据该方法和装置,可以仅使用页面文件的信息来执行数字取证。
    • 5. 发明申请
    • METHOD AND APPARATUS FOR ANALYZING EXPLOIT CODE IN NONEXECUTABLE FILE USING VIRTUAL ENVIRONMENT
    • 使用虚拟环境分析不可转让文件中的开发代码的方法和装置
    • US20090094585A1
    • 2009-04-09
    • US12056434
    • 2008-03-27
    • Young Han CHOIHyoung Chun KIMDo Hoon LEE
    • Young Han CHOIHyoung Chun KIMDo Hoon LEE
    • G06F9/44
    • G06F9/455G06F21/566
    • Provided is a method and apparatus for analyzing an exploit code included in a nonexecutable file using a target program with vulnerability in a virtual environment. The method includes the steps of: loading a nonexecutable file including the exploit code by a target program, the target program being executed in a virtual environment and includes vulnerability; analyzing a register value of the target program and determining if the register value of the target program indicates a normal code region; storing log information on operation of the target program when the register value indicates a region other than the normal code region; and extracting and analyzing the exploit code included in the nonexecutable file based on the stored log information. In this method, the exploit code is analyzed in the virtual environment, thereby preventing damage caused by execution of the exploit code.
    • 提供了一种用于使用在虚拟环境中具有脆弱性的目标程序来分析包含在不可执行文件中的利用代码的方法和装置。 该方法包括以下步骤:通过目标程序加载包括漏洞利用码的不可执行文件,目标程序在虚拟环境中执行,并且包括漏洞; 分析目标程序的寄存器值,并确定目标程序的寄存器值是否指示正常代码区; 当所述寄存器值指示除了所述正常代码区域之外的区域时,存储关于所述目标程序的操作的日志信息; 并且基于存储的日志信息提取和分析包括在不可执行文件中的利用代码。 在这种方法中,在虚拟环境中分析漏洞代码,从而防止由执行漏洞利用代码造成的损害。
    • 6. 发明申请
    • SYSTEM AND METHOD FOR DETECTING MALICIOUS SCRIPT
    • 用于检测恶性症状的系统和方法
    • US20110239294A1
    • 2011-09-29
    • US12944100
    • 2010-11-11
    • Tae Ghyoon KIMYoung Han CHOISeok Jin CHOICheol Won LEE
    • Tae Ghyoon KIMYoung Han CHOISeok Jin CHOICheol Won LEE
    • G06F21/00
    • G06F21/563G06F21/566
    • Provided are a system and method for detecting a malicious script. The system includes a script decomposition module for decomposing a web page into scripts, a static analysis module for statically analyzing the decomposed scripts in the form of a document file, a dynamic analysis module for dynamically executing and analyzing the decomposed scripts, and a comparison module for comparing an analysis result of the static analysis module and an analysis result of the dynamic analysis module to determine whether the decomposed scripts are malicious scripts. The system and method can recognize a hidden dangerous hypertext markup language (HTML) tag irrespective of an obfuscation technique for hiding a malicious script in a web page and thus can cope with an unknown obfuscation technique.
    • 提供了用于检测恶意脚本的系统和方法。 该系统包括用于将网页分解成脚本的脚本分解模块,用于以文档文件的形式静态分析分解的脚本的静态分析模块,用于动态地执行和分析分解的脚本的动态分析模块,以及比较模块 用于比较静态分析模块的分析结果和动态分析模块的分析结果,以确定分解的脚本是否是恶意脚本。 系统和方法可以识别隐藏的危险超文本标记语言(HTML)标签,而不管用于在网页中隐藏恶意脚本的混淆技术,并且因此可以应对未知的混淆技术。