会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Method and system for adaptive rule-based content scanners for desktop computers
    • 桌面电脑基于自适应规则的内容扫描仪的方法和系统
    • US07975305B2
    • 2011-07-05
    • US11009437
    • 2004-12-09
    • Moshe RubinMoshe MatityaArtem MelnickShlomo TouboulAlexander YermakovAmit Shaked
    • Moshe RubinMoshe MatityaArtem MelnickShlomo TouboulAlexander YermakovAmit Shaked
    • G06F11/00G06F21/00
    • G06F21/563
    • A security system for scanning content within a computer, including a network interface, housed within a computer, for receiving content from the Internet on its destination to an Internet application running on the computer, a database of rules corresponding to computer exploits, stored within the computer, a rule-based content scanner that communicates with said database of rules, for scanning content to recognize the presence of potential exploits therewithin, a network traffic probe, operatively coupled to the network interface and to the rule-based content scanner, for selectively diverting content from its intended destination to the rule-based content scanner, and a rule update manager that communicates with said database of rules, for updating said database of rules periodically to incorporate new rules that are made available. A method and a computer readable storage medium are also described and claimed.
    • 一种用于扫描计算机内的内容的安全系统,包括位于计算机内的网络接口,用于从其目的地上的因特网接收内容到在计算机上运行的因特网应用程序的内容,存储在计算机内的规则对应的规则数据库 计算机,与所述规则数据库通信的基于规则的内容扫描器,用于扫描内容以识别其中存在潜在漏洞;网络业务探测器,可操作地耦合到网络接口和基于规则的内容扫描器,用于选择性地 将内容从其预期目的地转移到基于规则的内容扫描器,以及规则更新管理器,其与所述规则数据库进行通信,用于周期性地更新所述规则数据库以包含可用的新规则。 还描述并要求保护方法和计算机可读存储介质。
    • 4. 发明申请
    • Method and system for adaptive rule-based content scanners for desktop computers
    • 桌面电脑基于自适应规则的内容扫描仪的方法和系统
    • US20050240999A1
    • 2005-10-27
    • US11009437
    • 2004-12-09
    • Moshe RubinMoshe MatityaArtem MelnickShlomo TouboulAlexander YermakovAmit Shaked
    • Moshe RubinMoshe MatityaArtem MelnickShlomo TouboulAlexander YermakovAmit Shaked
    • G06F11/30G06F12/14G06F21/00H04L9/00H04L9/32
    • G06F21/563
    • A security system for scanning content within a computer, including a network interface, housed within a computer, for receiving content from the Internet on its destination to an Internet application running on the computer, a database of rules corresponding to computer exploits, stored within the computer, a rule-based content scanner that communicates with said database of rules, for scanning content to recognize the presence of potential exploits therewithin, a network traffic probe, operatively coupled to the network interface and to the rule-based content scanner, for selectively diverting content from its intended destination to the rule-based content scanner, and a rule update manager that communicates with said database of rules, for updating said database of rules periodically to incorporate new rules that are made available. A method and a computer readable storage medium are also described and claimed.
    • 一种用于扫描计算机内的内容的安全系统,包括位于计算机内的网络接口,用于从其目的地上的因特网接收内容到在计算机上运行的因特网应用程序的内容,存储在计算机内的规则对应的规则数据库 计算机,基于规则的内容扫描器,其与所述规则数据库进行通信,用于扫描内容以识别其中的潜在漏洞的存在;网络流量探测器,可操作地耦合到网络接口和基于规则的内容扫描器,用于选择性地 将内容从其预期目的地转移到基于规则的内容扫描器,以及规则更新管理器,其与所述规则数据库进行通信,用于周期性地更新所述规则数据库以包含可用的新规则。 还描述并要求保护方法和计算机可读存储介质。
    • 5. 发明授权
    • System and method for blocking the transmission of sensitive data using dynamic data tainting
    • 使用动态数据污染来阻止敏感数据传输的系统和方法
    • US09489515B2
    • 2016-11-08
    • US13156952
    • 2011-06-09
    • Alexander YermakovMark Kaplan
    • Alexander YermakovMark Kaplan
    • G06F21/56G06F17/22H04L29/06G06F21/55
    • G06F21/563G06F17/227G06F21/554G06F21/56H04L63/0227H04L63/1408H04L63/168
    • Blocking transmission of tainted data using dynamic data tainting is described. For example, sensitive information is stored on a client device as tainted data. The client device generates a data request for retrieving data from a non-trusted entity via a network. A gateway is communicatively coupled to the client device and the network. The gateway receives computer code from the non-trusted entity via the network. The gateway executes the computer code. The gateway tracks the execution of the computer code to determine whether the computer code attempts to access tainted data and transmit the tainted data to an outside entity. The gateway blocks the transmission of the tainted data to the outside entity responsive to determining that the computer code has attempted to access tainted data and transmit the tainted data to an outside entity.
    • 描述了使用动态数据污染来阻止污染数据的传输。 例如,敏感信息作为污染数据存储在客户端设备上。 客户机设备经由网络产生用于从不可信实体检索数据的数据请求。 网关通信地耦合到客户端设备和网络。 网关通过网络从不可信实体接收计算机代码。 网关执行计算机代码。 网关跟踪计算机代码的执行,以确定计算机代码是否尝试访问污染的数据并将污染的数据传输到外部实体。 响应于确定计算机代码已经尝试访问污染的数据并将污染的数据发送到外部实体,网关阻止将污染的数据传输到外部实体。
    • 8. 发明申请
    • SYSTEM AND METHOD FOR BLOCKING THE TRANSMISSION OF SENSITIVE DATA USING DYNAMIC DATA TAINTING
    • 使用动态数据采集阻塞传感数据的系统和方法
    • US20110307951A1
    • 2011-12-15
    • US13156952
    • 2011-06-09
    • Alexander YermakovMark Kaplan
    • Alexander YermakovMark Kaplan
    • G06F21/20
    • G06F21/563G06F17/227G06F21/554G06F21/56H04L63/0227H04L63/1408H04L63/168
    • Blocking transmission of tainted data using dynamic data tainting is described. For example, sensitive information is stored on a client device as tainted data. The client device generates a data request for retrieving data from a non-trusted entity via a network. A gateway is communicatively coupled to the client device and the network. The gateway receives computer code from the non-trusted entity via the network. The gateway executes the computer code. The gateway tracks the execution of the computer code to determine whether the computer code attempts to access tainted data and transmit the tainted data to an outside entity. The gateway blocks the transmission of the tainted data to the outside entity responsive to determining that the computer code has attempted to access tainted data and transmit the tainted data to an outside entity.
    • 描述了使用动态数据污染来阻止污染数据的传输。 例如,敏感信息作为污染数据存储在客户端设备上。 客户机设备经由网络产生用于从不可信实体检索数据的数据请求。 网关通信地耦合到客户端设备和网络。 网关通过网络从不可信实体接收计算机代码。 网关执行计算机代码。 网关跟踪计算机代码的执行,以确定计算机代码是否尝试访问污染的数据并将污染的数据传输到外部实体。 响应于确定计算机代码已经尝试访问污染的数据并将污染的数据发送到外部实体,网关阻止将污染的数据传输到外部实体。