会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Identifying application sources on non-rooted devices
    • 在无根设备上识别应用程序源
    • US09092615B1
    • 2015-07-28
    • US13752026
    • 2013-01-28
    • Jun MaoAbubakar Wawda
    • Jun MaoAbubakar Wawda
    • G06F11/00G06F21/51
    • G06F21/51G06F2221/2149
    • A method and apparatus for identifying an application source from which an application is installed on a non-rooted computing device. An application source identifier of a security application that does not have root access to an operating system monitors for an application installation. The application source identifier extracts a process identifier (PID) of the application being installed from a log message associated with the application installation and determines a package name from the PID. The PID identifies an application source from which the application is installed. The application source identifier receives, based on the package name, a confidence level for the application source from a security service over a network.
    • 一种用于识别应用程序在非根系计算设备上安装应用程序的方法和装置。 不具有对操作系统的根访问权限的安全应用程序的应用程序源标识符监视应用程序安装。 应用程序源标识符从与应用程序安装相关联的日志消息中提取正在安装的应用程序的进程标识符(PID),并从PID确定程序包名称。 PID标识安装应用程序的应用程序源。 应用源标识符基于包名从基于网络的安全服务接收应用源的置信水平。
    • 8. 发明授权
    • Systems and methods for detecting illegitimate applications
    • 用于检测非法应用的系统和方法
    • US08732834B2
    • 2014-05-20
    • US13604422
    • 2012-09-05
    • Jun MaoBruce McCorkendaleBarry LaffoonAbubakar Wawda
    • Jun MaoBruce McCorkendaleBarry LaffoonAbubakar Wawda
    • G06F21/00H04L29/06
    • G06F21/57G06F21/554
    • A computer-implemented method for detecting illegitimate applications may include 1) identifying an installation of an application on a computing system, 2) determining, in response to identifying the installation of the application, that at least one system file with privileged access on the computing system has changed prior to the installation of the application, 3) determining that the application is illegitimate based at least in part on a time of the installation of the application relative to a time of a change to the system file, and 4) performing a remediation action on the application in response to determining that the application is illegitimate. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于检测非法应用的计算机实现的方法可以包括:1)识别计算系统上的应用的安装; 2)响应于识别应用的安装,确定至少一个在计算上具有特权访问的系统文件 系统在安装应用程序之前已经改变,3)至少部分地基于应用程序的安装时间相对于系统文件的更改时间确定该应用是非法的,以及4)执行一个 响应确定应用程序是非法的,对应用程序进行修复操作。 还公开了各种其它方法,系统和计算机可读介质。