会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Determination of valid email addresses in a private computer network
    • 确定私人计算机网络中的有效电子邮件地址
    • US08458261B1
    • 2013-06-04
    • US11401498
    • 2006-04-07
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • G06F15/16
    • H04L51/28H04L51/30
    • In one embodiment, a method of generating a listing of valid email addresses in a private computer network includes monitoring of inbound emails and outbound delivery failure notification emails. Recipient email addresses of inbound emails may be indicated in the listing as valid email addresses. The delivery failure notification emails may be indicative of receipt in the private computer network of an undeliverable email. The recipient email address of the undeliverable email may be identified in the listing as an invalid email address. Comparing the recipient email addresses of undeliverable emails and inbound emails advantageously allows generation of the listing of valid email addresses in the private computer network without having to ask an email server for such a listing.
    • 在一个实施例中,在专用计算机网络中生成有效电子邮件地址列表的方法包括监视入站电子邮件和出站递送失败通知电子邮件。 入站电子邮件的收件人电子邮件地址可能会在列表中显示为有效的电子邮件地址。 交付失败通知电子邮件可以指示在私人计算机网络中收到无法投递的电子邮件。 无法投递的电子邮件的收件人电子邮件地址可能会在列表中标识为无效的电子邮件地址。 比较无法投递的电子邮件和入站电子邮件的收件人电子邮件地址有助于在专用计算机网络中生成有效的电子邮件地址列表,而无需向电子邮件服务器询问此类列表。
    • 2. 发明授权
    • Method and apparatus for controlling traffic in a computer network
    • 用于控制计算机网络中的业务的方法和装置
    • US07533415B2
    • 2009-05-12
    • US10829466
    • 2004-04-21
    • Yi-Fen ChenYung-Chang LiangEn-Yi Liao
    • Yi-Fen ChenYung-Chang LiangEn-Yi Liao
    • G06F11/00
    • H04L63/145
    • In one embodiment, a technique for controlling traffic in a computer network includes modifying a packet generated by a first computer. The packet may be intended for a second computer, but is modified to be redirected to a third computer. The packet may be processed in the third computer prior to being forwarded from the third computer to the second computer. The packet may be scanned for viruses at the third computer, for example. Among other advantages, the technique allows for scanning of early generated packets, redirection of selected packets, and routing of packets from a computer in general.
    • 在一个实施例中,一种用于控制计算机网络中的业务的技术包括修改由第一计算机产生的分组。 分组可以用于第二计算机,但是被修改为被重定向到第三计算机。 在从第三计算机转发到第二计算机之前,该分组可以在第三计算机中被处理。 例如,可以在第三台计算机上扫描数据包的病毒。 除了其他优点之外,该技术允许早期生成的分组的扫描,所选分组的重定向以及一般来说来自计算机的分组的路由。
    • 6. 发明授权
    • Evaluation of incremental backup copies for presence of malicious codes in computer systems
    • 评估在计算机系统中存在恶意代码的增量备份副本
    • US08607342B1
    • 2013-12-10
    • US13100093
    • 2011-05-03
    • En-Yi LiaoChinghsien Liao
    • En-Yi LiaoChinghsien Liao
    • G06F12/14
    • G06F21/568G06F11/1469G06F2201/84
    • In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.
    • 在一个实施例中,评估包含数据存储设备的修改的可寻址部分的信息的增量备份用于存在恶意代码(“恶意软件”)。 每个修改的可寻址部分可以单独访问并扫描恶意代码。 每个修改的可寻址部分也可以被映射到其相关联的文件,允许相关联的文件被扫描恶意代码。 这些允许评估增量备份,即使它只包含几个不同文件的部分而不是整体。 在恶意代码感染的情况下,可以选择干净的增量备份来恢复数据存储设备。
    • 9. 发明授权
    • Techniques for defending an email system against malicious sources
    • 防止恶意电子邮件系统的技术
    • US08601064B1
    • 2013-12-03
    • US11414120
    • 2006-04-28
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • G06F15/16
    • H04L51/12H04L63/1425
    • In one embodiment, a server computer determines whether an email entering a private computer network is malicious (e.g., part of a directory harvest attack or bounce-source attack) by determining the recipient email address of the email and the Internet Protocol (IP) address of the source of the email. When the server computer determines that the email is malicious, the server computer may reject the email by sending a non-deterministic response to the source of the email. The non-deterministic response may include an error message that is different from the actual reason why the email is being rejected. The rejection may be sent as an immediate reply or postponed, for example.
    • 在一个实施例中,服务器计算机通过确定电子邮件的接收者电子邮件地址和互联网协议(IP)地址来确定进入专用计算机网络的电子邮件是否是恶意的(例如,目录收集攻击或反弹源攻击的一部分) 的电子邮件来源。 当服务器计算机确定该电子邮件是恶意的时,服务器计算机可以通过向该电子邮件的源发送非确定性响应来拒绝该电子邮件。 非确定性响应可能包括与电子邮件被拒绝的实际原因不同的错误消息。 例如,拒绝可以作为即时回复或推迟发送。
    • 10. 发明授权
    • Evaluation of incremental backup copies for presence of malicious codes in computer systems
    • 评估在计算机系统中存在恶意代码的增量备份副本
    • US07962956B1
    • 2011-06-14
    • US11594546
    • 2006-11-08
    • En-Yi LiaoChinghsien Liao
    • En-Yi LiaoChinghsien Liao
    • G06F12/14
    • G06F21/568G06F11/1469G06F2201/84
    • In one embodiment, incremental backups containing information on modified addressable portions of a data storage device are evaluated for presence of malicious codes (“malwares”). Each modified addressable portion may be individually accessed and scanned for malicious codes. Each modified addressable portion may also be mapped to its associated file, allowing the associated file to be scanned for malicious codes. These allow an incremental backup to be evaluated even when it only contains portions, rather than the entirety, of several different files. A clean incremental backup may be selected for restoring the data storage device in the event of malicious code infection.
    • 在一个实施例中,评估包含数据存储设备的修改的可寻址部分的信息的增量备份用于存在恶意代码(“恶意软件”)。 每个修改的可寻址部分可以单独访问并扫描恶意代码。 每个修改的可寻址部分也可以被映射到其相关联的文件,允许相关联的文件被扫描恶意代码。 这些允许评估增量备份,即使它只包含几个不同文件的部分而不是整体。 在恶意代码感染的情况下,可以选择干净的增量备份来恢复数据存储设备。