会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明申请
    • GLOBAL NETWORK MONITORING
    • 全球网络监控
    • WO2010011897A3
    • 2010-04-08
    • PCT/US2009051652
    • 2009-07-24
    • ZSCALER INCKAILASH KAILASHCHAUDHRY JAY
    • KAILASH KAILASHCHAUDHRY JAY
    • H04W24/10
    • H04L63/1425H04L43/00
    • Systems, methods and apparatus monitor networks to identify when the networks are not operating normally, for instance, because of malware. During a sample interval sample data is collected that corresponds to a plurality of system activities, the sample data collected from a plurality of monitored networks and representing normal operations of the plurality of monitored networks. Subsequent to the sample interval, observed data is collected from the plurality of monitored networks, the observed data corresponding to at least some of the system activities. A determination is made whether the observed data represents the normal operation of the monitored networks, and an alert is generated if the observed data does not represent the normal operation of the monitored networks.
    • 系统,方法和设备监控网络,以确定网络何时不正常运行,例如恶意软件。 在样本间隔期间,采集对应于多个系统活动的样本数据,从多个被监测网络收集的样本数据,并表示多个被监测网络的正常操作。 在采样间隔之后,从多个被监测网络收集观测数据,所观察到的数据对应于至少一些系统活动。 确定观察到的数据是否表示所监视的网络的正常操作,并且如果观察到的数据不表示所监视的网络的正常操作,则产生警报。
    • 9. 发明申请
    • FEATURE BASED DATA MANAGEMENT
    • 基于特征的数据管理
    • WO2010011902A3
    • 2010-04-22
    • PCT/US2009051658
    • 2009-07-24
    • ZSCALER INCKAILASH KAILASHREGOTI LAKSHMAIAHGANAPATHY HARIHARAN
    • KAILASH KAILASHREGOTI LAKSHMAIAHGANAPATHY HARIHARAN
    • G06F21/22G06F21/00
    • H04L63/10G06F9/466G06F9/52
    • Methods, systems, and apparatus, including computer program products, for data structure locking. In one aspect, a proper subset of variables of a set of variables in a data structure are received. An access privilege to modify variables in the data structure to administrator accounts is assigned. A first administrator access request to modify a variable in the proper subset of variables is received, and the access privilege to modify the variable in the proper subset of variables for the first administrator account. A second administrator access request to modify the variable in the proper subset of variables is received, and an access timer that expires after a time period is initiated; the access privilege is disabled for the first administrator account in response to expiration of the access timer; and the access privilege for the second administrator account is enabled in response to expiration of the access timer.
    • 用于数据结构锁定的方法,系统和装置,包括计算机程序产品。 在一个方面,接收数据结构中的一组变量的适当子集的变量。 指定将数据结构中的变量修改为管理员帐户的访问权限。 接收第一个管理员访问请求以修改变量的适当子集中的变量,并且访问权限修改第一个管理员帐户的适当子变量中的变量。 接收用于修改变量的适当子集中的变量的第二管理员访问请求,并且启动一段时间之后到期的访问定时器; 响应于访问定时器的到期,针对第一管理员账户禁用访问权限; 并且响应于访问定时器的期满,启用针对第二管理员账户的访问权限。