会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Methods and apparatus for dealing with malware
    • 用于处理恶意软件的方法和设备
    • US08418250B2
    • 2013-04-09
    • US11477807
    • 2006-06-30
    • Melvyn MorrisPaul StubbsMarkus HartwigDarren Harter
    • Melvyn MorrisPaul StubbsMarkus HartwigDarren Harter
    • G06F21/00
    • G06F21/56G06F21/577
    • In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    • 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。
    • 3. 发明申请
    • CONTROLLING APPLICATION FEATURES
    • 控制应用特点
    • US20080127053A1
    • 2008-05-29
    • US11470896
    • 2006-09-07
    • Paul StubbsEric S. SchneppPeter J. TorrJohn A. Shepard
    • Paul StubbsEric S. SchneppPeter J. TorrJohn A. Shepard
    • G06F9/44
    • G06F8/65G06F8/34G06F8/38G06F8/71
    • A facility is provided for controlling application features. In various embodiments, the facility assembles an indication of features, starts a controlled application, and provides the assembled indication of features to the controlled application so that the controlled application can disable a feature of the controlled application. The facility can include a controlling application that is adapted for assembling a set of tokens that identify features by adding or removing tokens when a user of the controlling application selects a command associated with the controlling application, and a controlled application that, when invoked by the controlling application and provided the assembled set of tokens, controls a feature of the controlled application based on the assembled set of tokens.
    • 提供了一个用于控制应用程序功能的工具。 在各种实施例中,设施组合特征的指示,启动受控应用,并将特征的组合指示提供给受控应用,使得受控应用可以禁用受控应用的特征。 该设施可以包括控制应用程序,该控制应用程序适用于组合一组令牌,该组令牌通过在控制应用程序的用户选择与该控制应用程序相关联的命令时,通过添加或删除令牌来识别特征;以及受控应用程序, 控制应用程序并提供组合的令牌集,基于组合的令牌控制受控应用的特征。
    • 4. 发明申请
    • MANAGING APPLICATION CUSTOMIZATION
    • 管理应用程序自定义
    • US20080066051A1
    • 2008-03-13
    • US11470863
    • 2006-09-07
    • Paul StubbsPhilo N. NordlundJohn A. ShepardThomas E. QuinnC. Douglas Hodges
    • Paul StubbsPhilo N. NordlundJohn A. ShepardThomas E. QuinnC. Douglas Hodges
    • G06F9/44
    • G06F8/60G06F8/20G06F9/44505
    • A facility is provided for managing application customization. In various embodiments, an application associated with the facility receives an indication of an application identifier that identifies a customized instance of the application, determines whether the customized instance of the application is available and, when the customized instance of the application is available, configures the application to employ a resource associated with the customized instance of the application. The facility can receive an identifier and an indication to update common components of an application, the application having a customized instance of the application; remove components associated with the customized instance of the application; copy common components associated with the application; associate the common components with the received identifier; and apply customizing components that customize the common components of the application to create a customized instance of the application.
    • 提供了一个管理应用程序定制的设施。 在各种实施例中,与设施相关联的应用接收标识应用的定制实例的应用标识符的指示,确定应用的定制实例是否可用,并且当应用的定制实例可用时, 应用程序来使用与应用程序的定制实例相关联的资源。 该设施可以接收标识符和用于更新应用的公共组件的指示,该应用具有应用的定制实例; 删除与应用程序的定制实例相关联的组件; 复制与应用程序相关联的常见组件; 将公共组件与接收到的标识符相关联; 并应用定制应用程序的常见组件的定制组件来创建应用程序的自定义实例。
    • 8. 发明申请
    • METHODS AND APPARATUS FOR DEALING WITH MALWARE
    • 用于处理恶意软件的方法和装置
    • US20120278891A1
    • 2012-11-01
    • US13543865
    • 2012-07-08
    • Melvyn MorrisPaul StubbsMarkus HartwigDarren Harter
    • Melvyn MorrisPaul StubbsMarkus HartwigDarren Harter
    • G06F21/00
    • G06F21/56G06F21/577
    • In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object;the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    • 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。
    • 9. 发明申请
    • APPLICATION PROXY
    • 应用代理
    • US20080127055A1
    • 2008-05-29
    • US11470959
    • 2006-09-07
    • Jackson M. DavisPaul StubbsJohn A. Shepard
    • Jackson M. DavisPaul StubbsJohn A. Shepard
    • G06F9/45
    • G06F8/20
    • A facility is provided for enabling an application proxy that is capable of customizing an integrated development environment to execute in-process with the integrated development environment. In various embodiments, the facility loads a project file, determines whether the project file indicates an application proxy, and when the project file indicates an application proxy, loads the application proxy so that the application proxy can customize the integrated development environment based on configuration settings. In various embodiments, the facility includes a project file associated with an application, an application proxy component, and an integrated development environment that loads the application proxy component when loading the project file so that the application proxy component can handle communications between the integrated development environment and the application to customize the integrated development environment for use with the application.
    • 提供了一种能够使能够定制集成开发环境以在集成开发环境中执行的应用代理的设施。 在各种实施例中,设备加载项目文件,确定项目文件是否指示应用代理,以及项目文件指示应用代理时,加载应用代理,使得应用代理可以基于配置设置自定义集成开发环境 。 在各种实施例中,该设施包括与应用程序相关联的项目文件,应用代理组件以及在加载项目文件时加载应用代理组件的集成开发环境,使得应用代理组件可以处理集成开发环境 以及应用程序来定制集成开发环境以与应用程序一起使用。
    • 10. 发明申请
    • Methods and apparatus for dealing with malware
    • 用于处理恶意软件的方法和设备
    • US20070016953A1
    • 2007-01-18
    • US11477807
    • 2006-06-30
    • Melvyn MorrisPaul StubbsMarkus HartwigDarren Harter
    • Melvyn MorrisPaul StubbsMarkus HartwigDarren Harter
    • G06F12/14
    • G06F21/56G06F21/577
    • In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.
    • 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。