会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明公开
    • OPTIMIZED SHRINKING OF VIRTUAL DISKS
    • 优选施华宁VON VIRTUELLEN FESTPLATTEN
    • EP2686763A1
    • 2014-01-22
    • EP12712460.0
    • 2012-03-09
    • Symantec Corporation
    • SOBEL, William, E.
    • G06F3/06G06F17/30
    • G06F3/0664G06F3/0608G06F3/061G06F3/0644
    • Various systems and methods shrinking a storage object. For example, one method can involve receiving a request to shrink the storage object. The storage object can comprise multiple storage locations. The method can also involve receiving a list that identifies a set of the storage locations. The list can be generated in response to the request to shrink the storage object. The method can also involve reading data from a set of storage locations in the storage object that are not identified in the received list and copying the read data from the first storage object to a second storage object.
    • 各种系统和方法缩小了存储对象。 例如,一种方法可以涉及接收收缩存储对象的请求。 存储对象可以包括多个存储位置。 该方法还可以包括接收标识一组存储位置的列表。 该列表可以响应于收缩存储对象的请求生成。 该方法还可以涉及从存储对象中的一组存储位置读取数据,这些存储位置在接收到的列表中未识别,并将读取的数据从第一存储对象复制到第二存储对象。
    • 3. 发明公开
    • THWARTING MAP-LOADED MODULE MASQUERADE ATTACKS
    • 摧毁地图加载的模块MASQUERADE攻击
    • EP1247150A2
    • 2002-10-09
    • EP01904858.6
    • 2001-01-11
    • SYMANTEC CORPORATION
    • SOBEL, William, E.GRAWROCK, David
    • G06F1/00
    • G06F21/565G06F21/552
    • Apparatus, computer-implemented method, and computer-readable medium for thwarting map-loaded module (8) attacks on a digital computer (1). Within the computer (1) is a registry (10) containing mappings from generic names (4) of map-loaded modules (8) to specific locations (5) of the map-loaded modules (8). Coupled to the registry (10) is a registry monitor module (20) adapted to monitor attempts to replace existing mappings (5) of map-loaded modules (8) with replacement mappings (5). Coupled to the map-loaded modules (8) is a file system monitor module (70) adapted to monitor attempts to insert new map-loaded modules (8) into the computer (1). Coupled to the registry monitor module (20) and to the file system monitor module (70) is a programmable control module (30) adapted to determine when a change in mapping constitutes a malicious code attack. Such determinations are made when one or more pre-established rules (50) are satisfied. Two categories of rules (50) can be pre-established for use by control module (30): a first set of rules (50) for which programmable control module (30) can make decisions on its own, and a second set of rules (50) for which programmable control module (30) passes control to a system administrator (40).
    • 用于阻止对数字计算机(1)上的映射加载模块(8)攻击的设备,计算机实现的方法和计算机可读介质。 在计算机(1)内是注册表(10),注册表(10)包含从加载地图的模块(8)的通用名称(4)到加载地图的模块(8)的特定位置(5)的映射。 耦合到注册表(10)的是注册表监视模块(20),其适于监视用替换映射(5)替换映射加载模块(8)的现有映射(5)的尝试。 耦合到加载地图的模块(8)的是文件系统监视模块(70),其适于监视将新的加载地图的模块(8)插入计算机(1)的尝试。 耦合到注册表监视器模块(20)和文件系统监视器模块(70)的是可编程控制模块(30),其适于确定映射中的变化何时构成恶意代码攻击。 当满足一个或多个预先建立的规则(50)时,做出这样的确定。 可以预先建立两类规则(50)供控制模块(30)使用:第一组规则(50),可编程控制模块(30)可以自己做出决定,第二组规则 (50),可编程控制模块(30)将控制传递给系统管理员(40)。