会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • Centralized code coverage data collection
    • 集中代码覆盖数据收集
    • US20070234309A1
    • 2007-10-04
    • US11395087
    • 2006-03-31
    • Brian DaviaCurtis AndersonCraig FleischmanLoren MerrimanVikas Singh
    • Brian DaviaCurtis AndersonCraig FleischmanLoren MerrimanVikas Singh
    • G06F9/44
    • G06F11/3676G06F11/3644
    • Code coverage data may be provided. An instrumented image may be created comprising a binary executable software module that may be populated with coverage code injected into the binary executable software module. A request for the instrumented image may be received and the instrumented image may be provided based upon the received request. In addition, the code coverage data may be received from the instrumented image. The code coverage data produced by the instrumented image may be executed during a test of the binary executable software module. The coverage code may be configured to produce the code coverage data configured to indicate what code within the binary executable software module was used during the test. The code coverage data may be analyzed and the binary executable software module may be optimized based on the code coverage data.
    • 可以提供代码覆盖数据。 可以创建包括二进制可执行软件模块的检测图像,该二进制可执行软件模块可以填充注入到二进制可执行软件模块中的覆盖代码。 可以接收对被检测图像的请求,并且可以基于接收到的请求来提供被检测的图像。 此外,可以从被检测的图像接收代码覆盖数据。 可以在二进制可执行软件模块的测试期间执行由被检测的图像产生的代码覆盖率数据。 覆盖代码可以被配置为产生代码覆盖率数据,其被配置为指示在测试期间使用二进制可执行软件模块内的什么代码。 可以分析代码覆盖率数据,并且可以基于代码覆盖数据来优化二进制可执行软件模块。
    • 10. 发明授权
    • System and method for risk rating and detecting redirection activities
    • 风险评估和检测重定向活动的系统和方法
    • US08869271B2
    • 2014-10-21
    • US12698922
    • 2010-02-02
    • Shankar JayaramanVikas SinghJayesh K. Sreedharan
    • Shankar JayaramanVikas SinghJayesh K. Sreedharan
    • G06F21/56G06F21/00H04L29/06H04L29/08
    • H04L63/1441H04L63/1416H04L63/1483H04L67/02H04L67/2814
    • A method in one example implementation includes sending a first request to a first network address on a first server and determining whether the first network address has been redirected on the server to a second network address. The method further includes searching a memory element for a predetermined risk rating associated with the second network address if the first network address has been redirected to the second network address. The method also includes providing a risk response to a client if a predetermined risk rating is found. In more specific embodiments, the risk response includes sending an alert to the client or blocking the client from accessing the second network address if the predetermined risk rating indicates the second network address is malicious. In other more specific embodiments, the first network address is redirected to one or more other network addresses before being redirected to the second network address.
    • 一个示例实现中的方法包括向第一服务器上的第一网络地址发送第一请求,并确定第一网络地址是否已经在服务器上被重定向到第二网络地址。 该方法还包括如果第一网络地址被重定向到第二网络地址,则搜索与第二网络地址相关联的预定风险等级的存储元件。 如果发现预定的风险等级,该方法还包括向客户提供风险响应。 在更具体的实施例中,风险响应包括:如果预定风险评级指示第二网络地址是恶意的,则向客户端发送警报或阻止客户端访问第二网络地址。 在其他更具体的实施例中,在重定向到第二网络地址之前,将第一网络地址重定向到一个或多个其他网络地址。