会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Crawling of object model using transformation graph
    • 使用变换图来爬行对象模型
    • US08296722B2
    • 2012-10-23
    • US12246065
    • 2008-10-06
    • Sachiko YoshihamaShinya KawanakaTakaaki TateishiOry SegalAdi SharabaniMarco PistoiaGuy Podjarny
    • Sachiko YoshihamaShinya KawanakaTakaaki TateishiOry SegalAdi SharabaniMarco PistoiaGuy Podjarny
    • G06F9/44
    • G06F8/10
    • A transformation tree for an object model (OM) is defined. The transformation tree has nodes interconnected by edges, where each node is connected to at most one other tree node. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. A transformation graph for the OM is constructed by simulating the transformation tree. The transformation graph has nodes interconnected by edges, and is a directed graph in which each node is connected to one or more other nodes. Each node corresponds to a state of the OM; each edge corresponds to an event causing the OM to transition from the state of one node to the state of another node. Crawling-oriented actions are performed in relation to the OM by being performed in relation to the transformation graph.
    • 定义了对象模型(OM)的转换树。 转换树具有通过边缘互连的节点,其中每个节点连接到最多一个其他树节点。 每个节点都对应于OM的状态; 每个边缘对应于导致OM从一个节点的状态转变到另一个节点的状态的事件。 通过模拟转换树构建OM的变换图。 转换图具有通过边缘互连的节点,并且是有向图,其中每个节点连接到一个或多个其他节点。 每个节点对应于OM的状态; 每个边缘对应于导致OM从一个节点的状态转变到另一个节点的状态的事件。 通过相对于变换图执行针对OM执行针对爬行的动作。
    • 10. 发明授权
    • Injection attack mitigation using context sensitive encoding of injected input
    • 注入攻击减轻使用注入输入的上下文敏感编码
    • US09009821B2
    • 2015-04-14
    • US13574011
    • 2011-06-08
    • Guy PodjarnyAdi Sharabani
    • Guy PodjarnyAdi Sharabani
    • G06F21/00H04L29/06G06F21/56H04L29/08
    • G06F21/563H04L63/1441H04L67/02
    • A method for preventing malicious code being embedded within a scripting language of a web application accessed by a web browser (308), the method comprising: monitoring all incoming traffic (310), generated by the web browser, and outgoing traffic (326) generated by a server (318) to form monitored traffic; determining whether a unique element, defined in a configuration file, is matched with an input value of the monitored traffic to form a matched input value; responsive to a determination that the unique element is matched with an input value of the monitored traffic, saving the matched input value, determining whether an output contains the matched input value in an expected location; responsive to a determination that the output contains the matched input value in an expected location, encoding the matched input value using a respective definition from the configuration file; and returning the output (330) to the requester.
    • 一种用于防止恶意代码嵌入由web浏览器(308)访问的web应用程序的脚本语言中的方法,所述方法包括:监视由web浏览器生成的所有传入流量(310)和产生的输出流量(326) 由服务器(318)形成监视的业务; 确定在配置文件中定义的唯一元素是否与所监视的流量的输入值匹配以形成匹配的输入值; 响应于所述唯一元素与所监视的业务的输入值匹配的确定,保存所匹配的输入值,确定输出是否包含预期位置中的匹配输入值; 响应于所述输出在预期位置中包含匹配的输入值的确定,使用来自所述配置文件的相应定义对所匹配的输入值进行编码; 并将输出(330)返回给请求者。