会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • System and method for intrusion decision-making in autonomic computing environments
    • 自主计算环境中入侵决策的系统和方法
    • US20050278178A1
    • 2005-12-15
    • US10865697
    • 2004-06-10
    • Janice GirouardEmily RatliffKimberly Simon
    • Janice GirouardEmily RatliffKimberly Simon
    • G06F21/00G10L11/00
    • G06F21/552
    • A mechanism is provided for performing intrusion decision-making using a plurality of approaches. Detection approaches may include, for example, signature-based, anomaly-based, scan-based, and danger theory approaches. When event information is received, each approach produces a result. A consensus of each result is then reached by using, for example, Bayesian Filtering. A corpus is kept for each approach. An intrusion corpus keeps combinations of the corpora for all of the approaches that constitute intrusions. A safe corpus keeps combinations of the corpora for all of the approaches that do not constitute an intrusion. The corpora for the approaches may be pre-defined according to security policies and the like. The intrusion corpus and the safe corpus may be trained using scores that are determined using the detection approaches.
    • 提供了一种用于使用多种方法执行入侵决策的机制。 检测方法可以包括例如基于签名的,基于异常的,基于扫描的和危险理论的方法。 当收到事件信息时,每个方法都会产生一个结果。 然后通过使用例如贝叶斯滤波来达到每个结果的共识。 为每种方法保留语料库。 入侵语料库将所有构成入侵的方法的语料库组合起来。 一个安全的语料库将所有不构成入侵的方法的语料库组合在一起。 用于方法的语料库可以根据安全策略等预先定义。 可以使用使用检测方法确定的分数来训练入侵语料库和安全语料库。
    • 12. 发明申请
    • Changing access permission based on usage of a computer resource
    • 根据计算机资源的使用更改访问权限
    • US20050246762A1
    • 2005-11-03
    • US10834497
    • 2004-04-29
    • Janice GirouardEmily RatliffKent YoderJerone Young
    • Janice GirouardEmily RatliffKent YoderJerone Young
    • H04L9/00H04L12/28H04L29/06
    • H04L63/104H04W74/00
    • Changing access permission based on usage of computer resources including maintaining records of a user's usage of computer resources in a security domain, the user having a scope of access permission for the computer resources; measuring the user's disuse of one or more of the computer resources in the security domain; and degrading the user's scope of access permission for the computer resources in dependence upon the user's disuse. Typical embodiments include receiving from a user a request for access to a requested computer resource, receiving from the user a request to upgrade the user's degraded scope of access permissions to grant access to the requested computer resource and upgrading, in dependence upon the user's request to upgrade the degraded scope of access permissions, the user's degraded scope of access permissions to grant access to the requested computer resource.
    • 基于计算机资源的使用来改变访问权限,包括维护用户对安全域中的计算机资源的使用的记录,所述用户对计算机资源具有访问权限的范围; 测量用户对安全域中的一个或多个计算机资源的废用; 并根据用户的使用降低用户对计算机资源的访问权限范围。 典型的实施例包括从用户接收对所请求的计算机资源的访问请求,从用户接收请求,以升级用户的访问权限的降级范围,以授权对所请求的计算机资源的访问,并根据用户的请求 升级访问权限的降级范围,用户对访问权限的降级范围授予对请求的计算机资源的访问权限。
    • 15. 发明申请
    • Method and system for automatic identification and notification of relevant software defects
    • 自动识别和通知相关软件缺陷的方法和系统
    • US20070168343A1
    • 2007-07-19
    • US11334659
    • 2006-01-18
    • Steven BestJanice GirouardRaymond Young
    • Steven BestJanice GirouardRaymond Young
    • G06F17/30
    • G06F17/30675Y10S707/99933
    • A system for automatic identification and notification of relevant program defects. A defect report server opens a defect description in response to receiving the defect description from an end user. Then, the defect report server extracts each word and phrase contained within the program defect description. After extracting each word and phrase, the defect report server searches a plurality of defect databases for each extracted word and phrase. If an extracted word or phrase is found in a defect database, the defect report server calculates a word relevancy percentage for each of the extracted words or phrases found in the search. Finally, if the word relevancy percentage for each extracted word and phrase exceeds a threshold, the defect report server sends all relevant defects associated with each extracted word and phrase that exceeded the predetermined threshold to a defect owner.
    • 用于自动识别和通知相关程序缺陷的系统。 缺陷报告服务器响应于从最终用户接收缺陷描述而打开缺陷描述。 然后,缺陷报告服务器提取包含在程序缺陷描述中的每个单词和短语。 在提取每个单词和短语之后,缺陷报告服务器针对每个提取的单词和短语搜索多个缺陷数据库。 如果在缺陷数据库中找到提取的单词或短语,则缺陷报告服务器计算搜索中发现的每个提取的单词或短语的单词相关性百分比。 最后,如果每个提取的单词和短语的相关性百分比超过阈值,则缺陷报告服务器将与提取出的每个提取的词和短语相关联的所有相关缺陷发送到缺陷所有者。