会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Internet site security system and method thereto
    • 互联网站点安全系统及其方法
    • US08549631B2
    • 2013-10-01
    • US13054816
    • 2009-02-12
    • Ho-Woong LeeSung Jin YangSang Min Chung
    • Ho-Woong LeeSung Jin YangSang Min Chung
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • G06F21/53
    • The present invention discloses an internet site security system and method thereof. That is, the present invention comprises a browser execution module which executes the browser for providing a work-performing environment on the internet site according to the selection of a user; a memory protection module which, according to the execution of the browser, prevents an external module from accessing a memory area allocated to the browser and detects whether the memory area is tampered or not and whether the executing code is tampered or not; and a browser protection module which prevents another process or module from debugging the browser execution module according to the execution of the browser, and distinguishing several modules loaded to the memory area into acceptable modules and unacceptable modules, and thereby is able to provide a secure electronic transaction based environment against a malicious attack.
    • 本发明公开了一种互联网站点安全系统及其方法。 也就是说,本发明包括浏览器执行模块,其执行用于根据用户的选择在因特网站点上提供工作执行环境的浏览器; 存储器保护模块,根据浏览器的执行,防止外部模块访问分配给浏览器的存储区域,并检测存储区域是否被篡改,以及执行代码是否被篡改; 以及浏览器保护模块,其防止另一进程或模块根据浏览器的执行调试浏览器执行模块,并将加载到存储区域的多个模块区分为可接受的模块和不可接受的模块,从而能够提供安全的电子 基于事务的环境,防止恶意攻击。
    • 9. 发明申请
    • METHOD AND APPARATUS FOR INSPECTING NON-PORTABLE EXECUTABLE FILES
    • 检查非易失性可执行文件的方法和装置
    • US20130305373A1
    • 2013-11-14
    • US13887610
    • 2013-05-06
    • AHNLAB, INC.
    • Cha Sung LIMJu Seok LEE
    • G06F21/56
    • G06F21/56G06F21/566
    • An apparatus for inspecting a non-PE file includes a data loading unit configured to load candidate malicious address information related to a malicious code of the non-PE file; and a program link unit configured to acquire normal address range information of a module being loaded on a memory when an application program adapted for the non-PE file is executed and set up a candidate malicious address corresponding to the candidate malicious address information to be a breakpoint of the application program. Further, the apparatus includes a malicious code determination unit configured to determine whether a next execution address is within the normal address range information when there occurs an event derived from the breakpoint.
    • 用于检查非PE文件的装置包括:数据加载单元,被配置为加载与所述非PE文件的恶意代码相关的候选恶意地址信息; 以及程序链接单元,被配置为当执行适用于所述非PE文件的应用程序时,获取正在加载到存储器上的模块的正常地址范围信息,并且将与所述候选恶意地址信息相对应的候选恶意地址设置为 应用程序的断点。 此外,该装置包括恶意代码确定单元,被配置为当发生从断点导出的事件时,确定下一个执行地址是否在正常地址范围信息内。