会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • MIME handling security enforcement
    • MIME处理安全执行
    • US08646078B2
    • 2014-02-04
    • US12685528
    • 2010-01-11
    • Venkatraman V KudallurShankar GaneshRoberto A FrancoVishu GuptaJohn G Bedworth
    • Venkatraman V KudallurShankar GaneshRoberto A FrancoVishu GuptaJohn G Bedworth
    • G06F12/14G08B23/00
    • G06F21/60G06F21/56G06F21/562G06F21/566
    • A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    • 模型限制不受信任的数据/对象在未经许可的情况下在用户计算机上运行。 数据由报告与DATA关联的MIME类型的协议层接收,并缓存数据和相关缓存文件名(CFN)。 安排MIME嗅探器根据缓存的数据,CFN和报告的MIME类型来识别嗅探的MIME类型。 调和逻辑评估嗅探的MIME类型和CFN以确定对帐的MIME类型,并更新CFN。 类ID嗅探器评估更新的CFN,缓存数据和已对帐的MIME类型,以确定适当的类ID。 安全逻辑评估更新的CFN,报告的类ID和其他相关系统参数以构建安全性矩阵。 来自安全矩阵的参数用于在不可信数据/对象可能在机器上创建安全漏洞之前拦截数据/对象。
    • 5. 发明申请
    • MIME Handling Security Enforcement
    • MIME处理安全执行
    • US20100107251A1
    • 2010-04-29
    • US12685528
    • 2010-01-11
    • Venkatraman V. KudallurShankar GaneshRoberto A. FrancoVishu GuptaJohn G. Bedworth
    • Venkatraman V. KudallurShankar GaneshRoberto A. FrancoVishu GuptaJohn G. Bedworth
    • G06F21/00G06F15/16
    • G06F21/60G06F21/56G06F21/562G06F21/566
    • A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    • 模型限制不受信任的数据/对象在未经许可的情况下在用户计算机上运行。 数据由报告与DATA关联的MIME类型的协议层接收,并缓存数据和相关缓存文件名(CFN)。 安排MIME嗅探器根据缓存的数据,CFN和报告的MIME类型来识别嗅探的MIME类型。 调和逻辑评估嗅探的MIME类型和CFN以确定对帐的MIME类型,并更新CFN。 类ID嗅探器评估更新的CFN,缓存数据和已对帐的MIME类型,以确定适当的类ID。 安全逻辑评估更新的CFN,报告的类ID和其他相关系统参数以构建安全性矩阵。 来自安全矩阵的参数用于在不可信数据/对象可能在机器上创建安全漏洞之前拦截数据/对象。
    • 6. 发明授权
    • MIME handling security enforcement
    • MIME处理安全执行
    • US07660999B2
    • 2010-02-09
    • US10873576
    • 2004-06-22
    • Venkatraman V. KudallurShankar GaneshRoberto A. FrancoVishu GuptaJohn G. Bedworth
    • Venkatraman V. KudallurShankar GaneshRoberto A. FrancoVishu GuptaJohn G. Bedworth
    • G06F12/14G06F12/16G06F15/16
    • G06F21/60G06F21/56G06F21/562G06F21/566
    • A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    • 模型限制不受信任的数据/对象在未经许可的情况下在用户计算机上运行。 数据由报告与DATA关联的MIME类型的协议层接收,并缓存数据和相关缓存文件名(CFN)。 安排MIME嗅探器根据缓存的数据,CFN和报告的MIME类型来识别嗅探的MIME类型。 调和逻辑评估嗅探的MIME类型和CFN以确定对帐的MIME类型,并更新CFN。 类ID嗅探器评估更新的CFN,缓存数据和已对帐的MIME类型,以确定适当的类ID。 安全逻辑评估更新的CFN,报告的类ID和其他相关系统参数以构建安全性矩阵。 来自安全矩阵的参数用于在不可信数据/对象可能在机器上创建安全漏洞之前拦截数据/对象。
    • 7. 发明申请
    • System and method for zone transition mitigation with relation to a network browser
    • 与网络浏览器相关的区域过渡缓解系统和方法
    • US20050246772A1
    • 2005-11-03
    • US10835909
    • 2004-04-30
    • Shankar GaneshRoberto FrancoKurt Schmucker
    • Shankar GaneshRoberto FrancoKurt Schmucker
    • G06F21/00H04L9/00H04L29/06
    • H04L63/168G06F21/53G06F21/6218H04L63/105
    • A method and system for determining whether to allow a network browser action when a transition occurs between security zones as a result of the action is provided. Gaining access to a local machine zone may be a goal for unauthorized entities attempting to improperly access a user's content. The present invention therefore may be initiated to block transitions from the security zones with stricter security restrictions to zones with less security restrictions. In addition, a selected alternative may be commenced depending on the relative weight of the security zones involved the zone transition. Depending on the relative weight of security zones, the transition between zones may be allowed, prevented, or the user may be prompted to decide whether to allow or prevent the action that results in the zone transition.
    • 提供了一种用于在作为结果的安全区之间发生转换时确定是否允许网络浏览器动作的方法和系统。 访问本地计算机区域可能是未经授权的实体尝试不正确访问用户内容的目标。 因此,本发明可以被启动以阻止具有更严格的安全限制的安全区域到具有较少安全限制的区域的转换。 此外,可以根据涉及区域转换的安全区域的相对权重来开始选择的替代方案。 根据安全区域的相对权重,可以允许,防止区域之间的过渡,或者可能会提示用户决定是否允许或阻止导致区域转换的动作。
    • 8. 发明申请
    • Security restrictions on binary behaviors
    • 对二进制行为的安全限制
    • US20050256960A1
    • 2005-11-17
    • US10836417
    • 2004-04-29
    • Shankar GaneshJohn Bedworth
    • Shankar GaneshJohn Bedworth
    • G06F15/16H04L29/06
    • H04L63/105
    • A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    • 安全模型基于识别的安全区域限制机器上的二进制行为。 二进制行为可以附加到文档,网页或电子邮件的元素。 二进制行为可能威胁到本地机器上的安全性。 安全管理员拦截下载请求和/或执行请求,识别所请求的二进制行为的安全区域,并限制基于安全区域的访问。 二进制行为可以根据相关URL识别安全区域。 在一个示例中,与安全区域相关联的所有二进制行为被相同地处理。 在另一个示例中,允许的二进制行为的列表与安全区域相关联,使得仅允许指定的二进制行为被访问。 在另一个示例中,不允许的二进制行为的列表与安全区域相关联,使得在列表中找到的二进制行为不能启动访问。