会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明申请
    • OBFUSCATING ENTRY OF SENSITIVE INFORMATION
    • 对敏感信息的输入
    • US20130298246A1
    • 2013-11-07
    • US13465116
    • 2012-05-07
    • Brian John CragunMarc Kevin Johlic
    • Brian John CragunMarc Kevin Johlic
    • G06F21/24
    • G06F21/83G06F21/36G06F2221/2123
    • A method, system, and computer program product for obfuscating entry of information are provided in the illustrative embodiments. A set of additional aspects to be applied to a part of an input is communicated to a provider of the input. The set of additional aspects is distinct from a second set of additional aspects to be applied to another input. An obfuscated input corresponding to the part of the input is received. A subset of the set of additional aspects is present in the obfuscated input. The part of the input from the obfuscated input is recovered by removing, using a processor and a memory, the subset of the set of additional aspects from the obfuscated input. An entry field input corresponding to the input is generated. The entry field input is sent to an application executing in a data processing system.
    • 在说明性实施例中提供了用于模糊信息输入的方法,系统和计算机程序产品。 将要应用于输入的一部分的一组附加方面传达给输入的提供者。 该组附加方面与要应用于另一输入的第二组附加方面不同。 接收与输入部分对应的混淆输入。 该组附加方面的子集存在于混淆输入中。 来自混淆输入的输入部分通过从处理器和存储器中除去来自混淆输入的附加方面的集合的子集来恢复。 生成与输入对应的输入字段输入。 输入字段输入被发送到在数据处理系统中执行的应用程序。
    • 34. 发明申请
    • Malware Detection for SMS/MMS Based Attacks
    • 基于SMS / MMS的攻击的恶意软件检测
    • US20120151588A1
    • 2012-06-14
    • US12964015
    • 2010-12-09
    • Wei WangGang Xu
    • Wei WangGang Xu
    • G06F21/00
    • G06F21/56G06F21/554G06F2221/2123H04L51/12H04L51/38H04L63/1491H04W12/12
    • Devices, systems, and methods are disclosed which utilize lightweight agents on a mobile device to detect message-based attacks. In exemplary configurations, the lightweight agents are included as contacts on the mobile device addressed to an agent server on a network. A malware onboard the mobile device, intending to propagate, unknowingly addresses the lightweight agents, sending messages to the agent server. The agent server analyzes the messages received from the mobile device of the deployed lightweight agents. The agent server then generates attack signatures for the malware. Using malware propagation models, the system estimates how many active mobile devices are infected as well as the total number of infected mobile devices in the network. By understanding the malware propagation, the service provider can decide how to deploy a mitigation plan on crucial locations. In further configurations, the mechanism may be used to detect message and email attacks on other devices.
    • 公开了在移动设备上利用轻量级代理来检测基于消息的攻击的设备,系统和方法。 在示例性配置中,轻量级代理作为联系人被包括在寻址到网络上的代理服务器的移动设备上。 移动设备上的恶意软件,意图传播,不知不觉地解决轻量级代理,向代理服务器发送消息。 代理服务器分析从部署的轻量级代理的移动设备接收的消息。 代理服务器然后生成恶意软件的攻击签名。 使用恶意软件传播模型,系统估计有多少活跃的移动设备被感染,以及网络中受感染的移动设备的总数。 通过了解恶意软件传播,服务提供商可以决定如何在关键位置部署缓解计划。 在进一步的配置中,该机制可以用于检测对其他设备的消息和电子邮件攻击。
    • 36. 发明申请
    • DETECTION OF GLOBAL METAMORPHIC MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSIS
    • 使用控制和数据流分析检测全球元素恶意软件变量
    • US20120072988A1
    • 2012-03-22
    • US13072114
    • 2011-03-25
    • Hira Agrawal
    • Hira Agrawal
    • G06F12/14
    • G06F21/563G06F21/561G06F2221/033G06F2221/2123
    • Malware feature extraction derives semantic summaries of executable malware using global, inter-procedural program analysis techniques. A combination of global, inter-procedural program analysis techniques constructs semantic summaries of malware which automatically detect and discard any noise introduced by transformations and capture the essence of the underlying computations in a succinct form. This is achieved in two ways. First, global control flow analysis techniques are used to derive a high level representation of malware code that, for instance, removes the effects of subroutine calls. Second, global data flow analysis techniques are employed to detect and remove all spurious elements of malware that do not contribute towards its underlying computation, thereby preventing the resulting summaries from being “corrupted” with unnecessary, extraneous elements.
    • 恶意软件特征提取使用全局,程序间程序分析技术来导出可执行文件恶意软件的语义摘要。 全局,程序间程序分析技术的组合构建了恶意软件的语义摘要,可自动检测和丢弃由转换引入的任何噪声,并以简洁的形式捕获底层计算的实质。 这是通过两种方式实现的。 首先,使用全局控制流分析技术来导出恶意软件代码的高级表示,例如,消除子程序调用的影响。 第二,使用全局数据流分析技术来检测和删除恶意软件的所有虚假元素,这些元素对其底层计算没有贡献,从而防止所得到的摘要与不必要的外部元素“损坏”。
    • 37. 发明授权
    • Method and apparatus for suppressing e-mail security artifacts
    • 用于抑制电子邮件安全伪像的方法和装置
    • US07950060B1
    • 2011-05-24
    • US11864867
    • 2007-09-28
    • Mark KennedyBruce McCorkendale
    • Mark KennedyBruce McCorkendale
    • G06F12/14
    • G06F21/56G06F2221/2123G06Q10/107
    • Method and apparatus for suppressing e-mail security artifacts is described. An aspect of the invention relates to processing e-mail addresses stored in an address book repository on a computer. A request for one or more e-mail addresses is received from a source. Authenticity of the source is verified. The one or more e-mail addresses is (are) obtained from the address book repository. The one or more e-mail addresses is (are) filtered to remove one or more honeypot e-mail addresses. The one or more e-mail addresses is (are) forwarded as filtered to the source if the source is authentic. The one or more e-mail addresses is (are) forwarded as obtained to the source if the source is not authentic. Accordingly, the honeypot addresses are not filtered if the source is not authentic.
    • 描述了用于抑制电子邮件安全伪像的方法和装置。 本发明的一个方面涉及处理存储在计算机上的地址簿存储库中的电子邮件地址。 从源接收到一个或多个电子邮件地址的请求。 验证来源的真实性。 一个或多个电子邮件地址从地址簿存储库获得。 一个或多个电子邮件地址被过滤以去除一个或多个蜜罐电子邮件地址。 如果源是可信的,那么一个或多个电子邮件地址被转发为源。 如果源不是真实的,那么一个或多个电子邮件地址被转发到源。 因此,如果源不可信,则蜜罐地址不被过滤。