会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 23. 发明授权
    • Smart card with volatile memory file subsystem
    • 智能卡带有易失性存储器文件子系统
    • US07506128B2
    • 2009-03-17
    • US11095204
    • 2005-03-31
    • Vinay DeoMihai CosteaMahesh Sharad LotlikarTak Chung LungDavid MilsteinGilad Odinak
    • Vinay DeoMihai CosteaMahesh Sharad LotlikarTak Chung LungDavid MilsteinGilad Odinak
    • G06F12/00
    • G07F7/1008G06F17/30067G06Q20/341G06Q20/3576Y10S707/99956
    • An integrated circuit (IC) module allows volatile data generated by applications to be stored within volatile data files in the volatile memory. A file system tracks the location of all data files as residing in either volatile memory or nonvolatile memory and facilitates access to the volatile data files in volatile memory in a similar manner to accessing nonvolatile data files in nonvolatile memory. The file system exposes a set of application program interfaces (APIs) to allow applications to access the data files. The same APIs are used to access both volatile data files and nonvolatile data files. When an application requests access to a data file, the file system initially determines whether the application is authorized to gain access to the data file. If it is, the file system next determines whether the data file resides in volatile memory or nonvolatile memory. Once the memory region is identified, the file system identifies the physical location of the data file.
    • 集成电路(IC)模块允许由应用产生的易失性数据存储在易失性存储器中的易失性数据文件中。 文件系统跟踪驻留在易失性存储器或非易失性存储器中的所有数据文件的位置,并且以与在非易失性存储器中访问非易失性数据文件相似的方式便于访问易失性存储器中的易失性数据文件。 文件系统公开了一组应用程序接口(API),以允许应用程序访问数据文件。 使用相同的API来访问易失性数据文件和非易失性数据文件。 当应用程序请求访问数据文件时,文件系统最初确定应用程序是否被授权访问数据文件。 如果是,则文件系统接下来确定数据文件是驻留在易失性存储器还是非易失性存储器中。 一旦存储区域被识别,文件系统就会识别数据文件的物理位置。
    • 24. 发明申请
    • Secure Transactional Communication
    • 安全交易沟通
    • US20080263156A1
    • 2008-10-23
    • US11736487
    • 2007-04-17
    • Mihai CosteaJeffrey B. KayJesse DoughertyMayerber Carvalho NetoJain ChandreshMayank Mehta
    • Mihai CosteaJeffrey B. KayJesse DoughertyMayerber Carvalho NetoJain ChandreshMayank Mehta
    • G06F15/16
    • H04L51/12H04L51/28
    • Systems for providing sign-up email addresses are disclosed herein. A user may set up a sign-up email address for receiving emails from a trusted, Internet-based enterprise. The user may set up a dedicated mailbox folder associated with the sign-up email address or enterprise. The email server may automatically direct emails coming from that enterprise into that folder. To “unsubscribe,” the user needs only to delete the folder or the sign-up address. Emails from the enterprise to the sign-up address may be highlighted in the user's main inbox. Thus, the user may be assured that any such email is truly from the enterprise, and not a phishing expedition or spam. Such systems also provide the user with effective tools to recognize phish or spam emails that appear to be from the trusted enterprise and not to act on them.
    • 本文公开了用于提供注册电子邮件地址的系统。 用户可以设置注册电子邮件地址来接收来自受信任的基于互联网的企业的电子邮件。 用户可以设置与注册电子邮件地址或企业相关联的专用邮箱文件夹。 电子邮件服务器可以自动将来自该企业的电子邮件引导到该文件夹​​中。 要“取消订阅”,用户只需删除该文件夹或注册地址即可。 电子邮件从企业到注册地址可能会在用户的主收件箱中突出显示。 因此,用户可以放心,任何这样的电子邮件真的来自企业,而不是网络钓鱼攻击或垃圾邮件。 这样的系统还为用户提供了有效的工具来识别似乎来自受信企业的网络钓鱼或垃圾邮件,而不是对它们采取行动。
    • 25. 发明申请
    • Bypassing software services to detect malware
    • 绕过软件服务来检测恶意软件
    • US20070180529A1
    • 2007-08-02
    • US11344360
    • 2006-01-30
    • Mihai CosteaYun Lin
    • Mihai CosteaYun Lin
    • G06F12/14
    • G06F21/567
    • A method, apparatus, and computer readable medium are provided by aspects of the present invention to determine whether a malware is resident on a host computer. In one embodiment, a method determines whether data that is characteristic of malware is loaded in the system memory of a host computer. More specifically, the method includes causing a device communicatively connected to a host computer to issue a request to obtain data loaded in the system memory. Then, when the requested data is received, a determination is made regarding whether the data is characteristic of malware. Since, the method causes data to be obtained directly from system memory without relying on software services on the host computer, malware that employs certain stealth techniques will be identified.
    • 通过本发明的方面提供方法,装置和计算机可读介质,以确定恶意软件是否驻留在主计算机上。 在一个实施例中,一种方法确定是否将具有恶意软件特征的数据加载到主计算机的系统存储器中。 更具体地,该方法包括使通信地连接到主计算机的设备发出获取加载到系统存储器中的数据的请求。 然后,当接收到所请求的数据时,确定数据是否是恶意软件的特征。 由于该方法可以直接从系统内存中获取数据,而不依赖主机上的软件服务,因此会识别采用某些隐身技术的恶意软件。
    • 26. 发明授权
    • System, method, and computer-readable medium for displaying keyboard cues in a window
    • 用于在窗口中显示键盘提示的系统,方法和计算机可读介质
    • US07114130B2
    • 2006-09-26
    • US10412787
    • 2003-04-10
    • Mihai CosteaGerardo BermudezMichael A. Schmidt
    • Mihai CosteaGerardo BermudezMichael A. Schmidt
    • G06F3/00G06T11/00
    • G06F3/04895G06F3/0481
    • A mechanism for predicting whether user interface elements, such as keyboard cues, would be helpful to a computer user and either displaying or hiding the user interface elements based on that prediction is disclosed. Briefly described, an identification is made whether the last input device was a keyboard or a pointing device, such as a mouse. If the last input device was a pointing device, the keyboard cues are hidden. If the last input device was a keyboard, the keyboard cues are displayed. If the input device changes after the keyboard cues have been initially either hidden or displayed, a message so indicating is passed up the window hierarchy. Upon receiving the message, the top-level window responds by causing the display states of all the windows in the window hierarchy to be updated to reflect the changed input device
    • 公开了一种用于预测用户界面元素(诸如键盘提示)对于计算机用户是否有帮助并且基于该预测显示或隐藏用户界面元素的机制。 简要描述,确定最后的输入设备是键盘还是诸如鼠标的指示设备。 如果最后一个输入设备是指点设备,则键盘提示被隐藏。 如果最后一个输入设备是键盘,则显示键盘提示。 如果输入设备在键盘提示最初被隐藏或显示之后发生变化,那么指示的消息将被传递给窗口层次结构。 在接收到消息时,顶层窗口通过使窗口层级中的所有窗口的显示状态被更新来反映改变的输入设备
    • 28. 发明授权
    • Filtering of electronic mail messages destined for an internal network
    • 过滤发往内部网络的电子邮件消息
    • US08566406B2
    • 2013-10-22
    • US12687259
    • 2010-01-14
    • Mayerber L. Carvalho NetoChandresh K. JainMayank MehtaMihai Costea
    • Mayerber L. Carvalho NetoChandresh K. JainMayank MehtaMihai Costea
    • G06F15/16
    • G06Q10/107
    • A perimeter network may be utilized to filter electronic mail messages destined for an internal network. A computer may be utilized to monitor an electronic mail mailbox for changes to a safe recipients list and/or a blocked senders list. The computer may further be utilized to automatically copy the safe recipients list and/or the blocked senders list to a network directory in the internal network. The computer may further be utilized to automatically send the safe recipients list and/or the blocked senders list to a network directory in the perimeter network for utilization by one or more agents executing on a computer in the perimeter network. The one or more agents may be configured to utilize the safe recipients list and/or the blocked senders list to filter electronic mail messages received by the perimeter network which are destined for delivery to the internal network.
    • 外围网络可以用于过滤去往内部网络的电子邮件消息。 可以使用计算机来监视电子邮箱,以改变安全的收件人列表和/或阻止的发件人列表。 该计算机还可用于将安全接收者列表和/或被阻止的发送者列表自动复制到内部网络中的网络目录。 该计算机还可被用于将安全接收者列表和/或被阻止的发送者列表自动发送到外围网络中的网络目录,以供在周边网络中的计算机上执行的一个或多个代理人使用。 一个或多个代理可以被配置为利用安全收件人列表和/或被阻止的发件人列表来过滤由外部网络接收的电子邮件消息,这些邮件消息旨在传送到内部网络。
    • 29. 发明授权
    • Access limited EMM distribution lists
    • 访问有限的EMM分发列表
    • US08166113B2
    • 2012-04-24
    • US11461984
    • 2006-08-02
    • Mihai CosteaKonstantin RyvkinMalcolm E. PearsonRoy Williams
    • Mihai CosteaKonstantin RyvkinMalcolm E. PearsonRoy Williams
    • G06F15/16
    • H04L51/12
    • An electronic mail message (EMM) addressed to a distribution list of an enterprise is received at a server of the enterprise from a sending address outside of the enterprise. If the distribution list has no external addresses, then the EMM is blocked from being delivered to the distribution list. In an embodiment, if the distribution list has an external address and the sending address is identified in a safe sender list corresponding to the distribution list, then the EMM is delivered to the distribution list. In an embodiment, if the distribution list has an external address, the sending address is not in a safe sender list corresponding to the distribution list, and the content of the message is approved, then the EMM is delivered to the distribution list.
    • 从企业外部的发送地址在企业的服务器处接收到发往企业分发列表的电子邮件消息(EMM)。 如果分发列表没有外部地址,则EMM被阻止传递到分发列表。 在一个实施例中,如果分发列表具有外部地址,并且在与分发列表相对应的安全发送者列表中识别发送地址,则将EMM传送到分发列表。 在一个实施例中,如果分发列表具有外部地址,则发送地址不在与分发列表对应的安全发送者列表中,并且消息的内容被批准,则EMM被递送到分发列表。
    • 30. 发明授权
    • Bypassing software services to detect malware
    • 绕过软件服务来检测恶意软件
    • US07757290B2
    • 2010-07-13
    • US11344360
    • 2006-01-30
    • Mihai CosteaYun Lin
    • Mihai CosteaYun Lin
    • G06F17/00G06F12/14G06F12/16G08B23/00
    • G06F21/567
    • A method, apparatus, and computer readable medium are provided by aspects of the present invention to determine whether a malware is resident on a host computer. In one embodiment, a method determines whether data that is characteristic of malware is loaded in the system memory of a host computer. More specifically, the method includes causing a device communicatively connected to a host computer to issue a request to obtain data loaded in the system memory. Then, when the requested data is received, a determination is made regarding whether the data is characteristic of malware. Since, the method causes data to be obtained directly from system memory without relying on software services on the host computer, malware that employs certain stealth techniques will be identified.
    • 通过本发明的方面提供方法,装置和计算机可读介质,以确定恶意软件是否驻留在主计算机上。 在一个实施例中,一种方法确定是否将具有恶意软件特征的数据加载到主计算机的系统存储器中。 更具体地,该方法包括使通信地连接到主计算机的设备发出获取加载到系统存储器中的数据的请求。 然后,当接收到所请求的数据时,确定数据是否是恶意软件的特性。 由于该方法可以直接从系统内存中获取数据,而不依赖主机上的软件服务,因此会识别采用某些隐身技术的恶意软件。