会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and apparatus for identifying members of a peer-to-peer botnet
    • 用于识别对等僵尸网络成员的方法和装置
    • US09009299B2
    • 2015-04-14
    • US12986573
    • 2011-01-07
    • Nasir MemonBaris Coskun
    • Nasir MemonBaris Coskun
    • G06F15/173H04L29/06H04L29/08
    • H04L63/1441H04L63/1433H04L67/104H04L67/1057
    • A peer-to-peer (P2P) bot(s) in a network is identified using an already identified P2P bot. More specifically, such embodiments may facilitate determining a candidate set of computers, which may be potential P2P bots, by identifying computers in a network that have a private mutual contact with a seed bot, which is a computer identified as a P2P bot, and identifying additional computers that have private mutual contacts with the identified computers. Further, a confidence level indicative of a certainty of a membership of each of the candidate computers in the P2P botnet is determined and responsive to a determination that the confidence level of the candidate computer exceeds a determined threshold confidence level, the candidate computer is identified as a P2P bot.
    • 使用已经识别的P2P bot来识别网络中的对等(P2P)机器人。 更具体地,这样的实施例可以通过识别网络中具有与被识别为P2P机器人的计算机的种子机器人的私有相互接触的计算机来识别可能是潜在的P2P机器人的候选的计算机集合,并且识别 与所识别的计算机具有私人相互联系的其他计算机。 此外,确定表示P2P僵尸网络中每个候选计算机的成员资格的确定性的置信水平,并且响应于候选计算机的置信水平超过确定的阈值置信水平的确定,候选计算机被识别为 一个P2P机器人
    • 7. 发明申请
    • EFFICIENT DETECTION OF RELAY NODE
    • 有效检测继电器NODE
    • US20090154375A1
    • 2009-06-18
    • US12268395
    • 2008-11-10
    • Baris CoskunNasir Memon
    • Baris CoskunNasir Memon
    • H04L12/28G06F11/00
    • H04L41/12H04L43/12
    • Whether or not a node is a relay node may be determined by, for each of a plurality of active flows, assigning a random number to the flow, wherein each of the random numbers is drawn from a distribution. Then, for each of a plurality of time slots, any incoming flows to the node and any outgoing flows from the node may be determined, random numbers assigned to any active flow of the incoming flows may be summed to generate a first sum, random numbers assigned to any active outgoing flows may be summed to generating a second sum, and the first sum may be multiplied with the second sum to generate a product associated with the time slot. The products over the plurality of time slots may then be summed to obtain a summed product. This may be repeated, reassigning random values to each of the plurality of flows, thereby obtaining a plurality of summed products. A variance of the plurality of summed products may be determined and compared with a threshold to obtain a comparison result. Whether or not the node is a relay node may then be determined using the comparison result. Execution of a relay node protection policy may be controlled using the determination of whether or not the node is a relay node.
    • 对于多个活动流中的每一个,可以通过为流分配随机数来确定节点是否是中继节点,其中每个随机数字从分布中抽出。 然后,对于多个时隙中的每个时隙,可以确定到节点的任何进入流和来自节点的任何输出流,可以将分配给输入流的任何活动流的随机数相加以生成第一和,随机数 分配给任何活动输出流的信号可以被相加以产生第二和,并且第一和可以与第二和相乘以生成与时隙相关联的乘积。 然后可以将多个时隙中的产品相加以获得相加的乘积。 这可以重复,将随机值重新分配给多个流中的每一个,从而获得多个相加的乘积。 可以确定多个相加产物的方差,并将其与阈值进行比较以获得比较结果。 然后可以使用比较结果来确定节点是否是中继节点。 可以使用确定节点是否是中继节点来控制中继节点保护策略的执行。
    • 8. 发明申请
    • Reassembling fragmented files or documents in a fragment order-independent manner
    • 以片段顺序独立的方式重新组装碎片文件或文档
    • US20070198606A1
    • 2007-08-23
    • US11523728
    • 2006-09-19
    • Nasir MemonAnandabrata PalKulesh Shanmugasundaram
    • Nasir MemonAnandabrata PalKulesh Shanmugasundaram
    • G06F17/30
    • G06F21/00
    • Files can be reassembled from fragments by (a) accepting adjacency scores for each pair of fragments from the set of fragments, (b) identifying header fragments from among the fragments of the set of fragments, and (c) for each of the header fragments identified, (i) setting a current fragment to the identified header fragment, (ii) selecting, from among any one of the fragments of the set not identified as a header fragment, a fragment with a best adjacency score with the current fragment, (iii) checking to determine if the selected fragment has a better adjacency score with any of the other fragments not identified as a header than with the current fragment, (iv) if it is determined that the selected fragment has a better adjacency score with any of the other fragments not identified as a header than with the current fragment, then (A) selecting another fragment, from among any one of the fragments of the set not identified as a header fragment, a fragment with a next best adjacency score with the current fragment, and (B) repeating (iii) and (iv), and if it is determined that the selected fragment does not have a better adjacency score with any of the other fragments not identified as a header than with the current fragment, then (A) adding the selected fragment to a reassembly path started with the identified header fragment, and (B) setting the current fragment to the selected fragment, and (v) repeating (ii)-(iv) until the file is reconstructed.
    • 通过(a)从片段集合中接收每对片段的邻接得分,(b)从片段集合的片段中识别标题片段,以及(c)对于标题片段中的每一个,可以从片段重新组装文件 识别,(i)将当前片段设置为所识别的标题片段,(ii)从未被标识为标题片段的片段中的任一片段中选择具有与当前片段的最佳邻接得分的片段( iii)检查以确定所选择的片段是否与未被标识为与当前片段相比的标题的任何其他片段具有更好的邻接得分,(iv)如果确定所选择的片段具有更好的邻接得分, 其他片段未被标识为与当前片段相比的标题,则(A)从未被标识为标题片段的片段中的任何一个片段中选择另一片段,具有下一最佳相邻片段 以及(B)重复(iii)和(iv),并且如果确定所选择的片段与没有被标识为标题的任何其他片段没有比当前片段更好的相邻分数 然后(A)将所选择的片段添加到由所识别的标题片段开始的重新组装路径中,以及(B)将当前片段设置为所选择的片段,以及(v)重复(ii) - (iv)直到文件为 重建。
    • 9. 发明授权
    • Computer network security system employing portable storage device
    • 计算机网络安全系统采用便携式存储设备
    • US07228438B2
    • 2007-06-05
    • US10001687
    • 2001-10-23
    • Dennis BushmitchNasir MemonSathya Narayanan
    • Dennis BushmitchNasir MemonSathya Narayanan
    • H04L9/32H04L9/00G06F15/16
    • H04L63/0281H04L29/06H04L63/029H04L63/0435H04L63/064H04L63/0838H04L63/166
    • The trusted computer network is protected behind a gateway that includes a bastion host and screening router which blocks all URLs associated with the trusted network. The bastion host includes a remote client authentication mechanism and web proxy component that verifies and translates incoming URL requests from authenticated remote clients. Authentication is performed using one-time passwords that are stored on a portable storage device. The user configures the portable storage device by operating configuration software from the protected side of the gateway. The portable storage device also stores plug-in software to enable the client computer to properly retrieve the one-time password and exchange authentication messages with the bastion host. Further security is obtained by basing the one-time password on an encrypted version of the user's PIN. A symmetric key used to encrypt the PIN is stored in a protected area within the portable storage device.
    • 受信任的计算机网络被保护在包括堡垒主机和筛选路由器的网关之后,该路由器阻止与可信网络相关联的所有URL。 堡垒主机包括远程客户端认证机制和Web代理组件,用于验证和翻译来自已验证远程客户端的传入URL请求。 使用存储在便携式存储设备上的一次性密码来执行认证。 用户通过从网关的受保护侧操作配置软件来配置便携式存储设备。 便携式存储设备还存储插件软件,以使得客户端计算机能够正确地检索一次性密码并与堡垒主机交换认证消息。 通过将一次性密码基于用户PIN的加密版本来获得进一步的安全性。 用于加密PIN的对称密钥存储在便携式存储设备内的保护区域中。
    • 10. 发明申请
    • METHOD AND APPARATUS FOR IDENTIFYING MEMBERS OF A PEER-TO-PEER BOTNET
    • 用于识别对等网络的成员的方法和装置
    • US20110179164A1
    • 2011-07-21
    • US12986573
    • 2011-01-07
    • Nasir MemonBaris Coskun
    • Nasir MemonBaris Coskun
    • G06F15/173
    • H04L63/1441H04L63/1433H04L67/104H04L67/1057
    • A peer-to-peer (P2P) bot(s) in a network is identified using an already identified P2P bot. More specifically, such embodiments may facilitate determining a candidate set of computers, which may be potential P2P bots, by identifying computers in a network that have a private mutual contact with a seed bot, which is a computer identified as a P2P bot, and identifying additional computers that have private mutual contacts with the identified computers. Further, a confidence level indicative of a certainty of a membership of each of the candidate computers in the P2P botnet is determined and responsive to a determination that the confidence level of the candidate computer exceeds a determined threshold confidence level, the candidate computer is identified as a P2P bot.
    • 使用已经识别的P2P bot来识别网络中的对等(P2P)机器人。 更具体地,这样的实施例可以通过识别网络中具有与被识别为P2P机器人的计算机的种子机器人的私有相互接触的计算机来识别可能是潜在的P2P机器人的候选的计算机集合,并且识别 与所识别的计算机具有私人相互联系的其他计算机。 此外,确定表示P2P僵尸网络中每个候选计算机的成员资格的确定性的置信水平,并且响应于候选计算机的置信水平超过确定的阈值置信水平的确定,候选计算机被识别为 一个P2P机器人