会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Anti-malware scanning in a portable application virtualized environment
    • 在可移植应用程序虚拟化环境中的反恶意软件扫描
    • US08312547B1
    • 2012-11-13
    • US12059764
    • 2008-03-31
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • H04L29/06
    • G06F21/567
    • A computer includes a portable environment including a portable file system located on a removable storage device, the portable environment using virtualization in a host operating system. A path translation module translates a virtualized path of a file in the portable file system to an actual path of the file. The virtualized path is the path in the context of a portable user application running in the portable environment, and the actual path is the path in the context of the host operating system. A malware detection module executing directly under the host operating system determines whether the file contains malware using the actual path of the file and takes remedial actions if malware is detected.
    • 计算机包括便携式环境,其包括位于可移动存储设备上的便携式文件系统,所述便携式环境在主机操作系统中使用虚拟化。 路径转换模块将便携式文件系统中的文件的虚拟路径转换为文件的实际路径。 虚拟化路径是在便携式环境中运行的便携式用户应用程序的上下文中的路径,实际路径是主机操作系统上下文中的路径。 在主机操作系统下直接执行的恶意软件检测模块确定该文件是否包含使用该文件的实际路径的恶意软件,并在检测到恶意软件时采取补救措施。
    • 13. 发明授权
    • Systems and methods for determining whether to perform a computing operation that is optimized for a specific storage-device-technology type
    • 用于确定是否执行针对特定存储设备技术类型而优化的计算操作的系统和方法
    • US08140804B1
    • 2012-03-20
    • US12337132
    • 2008-12-17
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • G06F3/00G06F12/00
    • G06F3/0653G06F3/0605G06F3/0634G06F3/0679
    • A computer-implemented method for determining whether to perform a computing operation that is optimized for a specific storage-device-technology type may comprise: 1) performing at least one proximate read operation by accessing a control location on a storage device and then accessing a test location on the storage device that is logically proximate to the control location, 2) performing at least one remote read operation by accessing a test location on the storage device that is logically remote from the control location, 3) determining, by comparing a length of time to access the proximate test location with a length of time to access the remote test location, a technology type of the storage device, and then 4) determining, based on the technology type of the storage device, whether to perform the computing operation. Corresponding systems and computer-readable media are also disclosed.
    • 用于确定是否执行针对特定存储设备技术类型优化的计算操作的计算机实现的方法可以包括:1)通过访问存储设备上的控制位置并且然后访问 在逻辑上靠近控制位置的存储设备上的测试位置,2)通过访问逻辑上远离控制位置的存储设备上的测试位置来执行至少一个远程读取操作,3)通过比较长度 的时间以访问远程测试位置的时间长度,存储设备的技术类型,然后4)基于存储设备的技术类型来确定是否执行计算操作 。 还公开了相应的系统和计算机可读介质。
    • 17. 发明授权
    • Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests
    • 启用主机和多个客户端之间的配置元素的选择性策略驱动的传播
    • US08578006B2
    • 2013-11-05
    • US13074850
    • 2011-03-29
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • G06F15/173
    • G06F9/44505
    • Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.
    • 基于策略,配置元素在主机和多个客户端之间选择性地传播。 监控主机和客户端的配置元素。 检测到对受监视的配置元素进行的更改。 根据策略确定是否在操作系统环境之间传播已更改的配置元素。 响应于诸如源的身份和/或分类或类型,属性,内容和/或身份的因素,可以确定将更改的配置元素从源传播到一个或多个目的地 的更改的配置元素。 检测到新客人的创建。 作为响应,来自至少一个源的至少一个配置元素被自动传播到新创建的访客。
    • 18. 发明授权
    • Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment
    • 防止使用违反编译器生成的对齐方式的字节序列的系统和方法
    • US08434073B1
    • 2013-04-30
    • US12263739
    • 2008-11-03
    • Sourabh SatishBruce McCorkendaleWilliam E. Sobel
    • Sourabh SatishBruce McCorkendaleWilliam E. Sobel
    • G06F9/44G06F9/45G06F9/445G06F12/00G06F12/14
    • G06F21/54
    • An exemplary method for preventing exploitation of byte sequences that violate compiler-generated instruction alignment may comprise: 1) identifying instantiation of a process, 2) identifying an address space associated with the process, 3) identifying, within the address space associated with the process, at least one control-transfer instruction, 4) determining that at least one byte preceding the control-transfer instruction is capable of resulting in an out-of-alignment instruction, and then 5) preventing the control-transfer instruction from being executed. In one example, the system may prevent the control-transfer instruction from being executed by inserting a hook in place of the intended instruction that executes the intended instruction and then returns control flow back to the instantiated process. Corresponding systems and computer-readable media are also disclosed.
    • 用于防止违反编译器生成的指令对准的字节序列的示例性方法可以包括:1)识别过程的实例化,2)识别与该过程相关联的地址空间,3)在与该过程相关联的地址空间内识别 ,至少一个控制传输指令,4)确定控制传输指令之前的至少一个字节能够导致不对齐指令,然后5)防止执行控制传输指令。 在一个示例中,系统可以通过插入钩来代替执行预期指令的预期指令来防止控制传输指令被执行,然后将控制流程返回到实例化的进程。 还公开了相应的系统和计算机可读介质。