会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Systems and methods for detecting illegitimate applications
    • 用于检测非法应用的系统和方法
    • US08732834B2
    • 2014-05-20
    • US13604422
    • 2012-09-05
    • Jun MaoBruce McCorkendaleBarry LaffoonAbubakar Wawda
    • Jun MaoBruce McCorkendaleBarry LaffoonAbubakar Wawda
    • G06F21/00H04L29/06
    • G06F21/57G06F21/554
    • A computer-implemented method for detecting illegitimate applications may include 1) identifying an installation of an application on a computing system, 2) determining, in response to identifying the installation of the application, that at least one system file with privileged access on the computing system has changed prior to the installation of the application, 3) determining that the application is illegitimate based at least in part on a time of the installation of the application relative to a time of a change to the system file, and 4) performing a remediation action on the application in response to determining that the application is illegitimate. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于检测非法应用的计算机实现的方法可以包括:1)识别计算系统上的应用的安装; 2)响应于识别应用的安装,确定至少一个在计算上具有特权访问的系统文件 系统在安装应用程序之前已经改变,3)至少部分地基于应用程序的安装时间相对于系统文件的更改时间确定该应用是非法的,以及4)执行一个 响应确定应用程序是非法的,对应用程序进行修复操作。 还公开了各种其它方法,系统和计算机可读介质。
    • 4. 发明授权
    • Using expectation measures to identify relevant application analysis results
    • 使用期望措施确定相关应用分析结果
    • US08806644B1
    • 2014-08-12
    • US13481715
    • 2012-05-25
    • Bruce McCorkendaleJun Mao
    • Bruce McCorkendaleJun Mao
    • G06F21/00H04L29/06
    • H04L63/1416
    • An application is analyzed, thereby detecting behaviors of the application. Data indicative of the functionality of the application is mined from a plurality of sources. The application is categorized based on the mined data. The categorization of the application indicates expected application behaviors. Multiple categories can be assigned to the application, wherein each assigned category correlates with at least one expected application behavior. Measures of consistency between the detected behaviors of the application and the expected behaviors of the application are determined. Determining the measures of consistency comprises quantifying differences between detected behaviors of the application and expected behaviors of the application. Responsive to the determined measures of consistency, it is adjudicated whether the application is suspect of being malicious.
    • 分析应用程序,从而检测应用程序的行为。 表示应用程序的功能的数据是从多个来源开采的。 应用程序根据开采的数据进行分类。 应用程序的分类表明预期的应用行为。 可以将多个类别分配给应用,其中每个分配的类别与至少一个预期的应用行为相关。 确定应用程序检测到的行为与应用程序的预期行为之间的一致性度量。 确定一致性的措施包括量化应用程序的检测行为与应用程序的预期行为之间的差异。 针对确定的一致性措施,判定应用程序是否被怀疑是恶意的。
    • 10. 发明授权
    • Parental policy based online wish lists
    • 基于父母政策的在线愿望清单
    • US08762229B1
    • 2014-06-24
    • US11959439
    • 2007-12-18
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • G06Q30/00
    • G06Q30/0633
    • A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children.
    • 强制执行家长政策进行网上购物。 父母输入父母政策,指示禁止孩子使用的项目。 当孩子尝试将项目添加到愿望清单中时,根据策略确定项目是否被允许。 如果是这样,则允许将项目添加到愿望清单中。 如果该政策禁止该项目,该项目添加到愿望清单将被阻止。 此外,父母可以通过(通过电子邮件,电话等)通知尝试将项目添加到愿望清单。 相同的逻辑可以应用于为儿童购买物品的尝试,或尝试购买儿童的物品。