会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Determination of valid email addresses in a private computer network
    • 确定私人计算机网络中的有效电子邮件地址
    • US08458261B1
    • 2013-06-04
    • US11401498
    • 2006-04-07
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • G06F15/16
    • H04L51/28H04L51/30
    • In one embodiment, a method of generating a listing of valid email addresses in a private computer network includes monitoring of inbound emails and outbound delivery failure notification emails. Recipient email addresses of inbound emails may be indicated in the listing as valid email addresses. The delivery failure notification emails may be indicative of receipt in the private computer network of an undeliverable email. The recipient email address of the undeliverable email may be identified in the listing as an invalid email address. Comparing the recipient email addresses of undeliverable emails and inbound emails advantageously allows generation of the listing of valid email addresses in the private computer network without having to ask an email server for such a listing.
    • 在一个实施例中,在专用计算机网络中生成有效电子邮件地址列表的方法包括监视入站电子邮件和出站递送失败通知电子邮件。 入站电子邮件的收件人电子邮件地址可能会在列表中显示为有效的电子邮件地址。 交付失败通知电子邮件可以指示在私人计算机网络中收到无法投递的电子邮件。 无法投递的电子邮件的收件人电子邮件地址可能会在列表中标识为无效的电子邮件地址。 比较无法投递的电子邮件和入站电子邮件的收件人电子邮件地址有助于在专用计算机网络中生成有效的电子邮件地址列表,而无需向电子邮件服务器询问此类列表。
    • 2. 发明授权
    • Techniques for defending an email system against malicious sources
    • 防止恶意电子邮件系统的技术
    • US08601064B1
    • 2013-12-03
    • US11414120
    • 2006-04-28
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • En-Yi LiaoCheng-Lin HouChinghsien Liao
    • G06F15/16
    • H04L51/12H04L63/1425
    • In one embodiment, a server computer determines whether an email entering a private computer network is malicious (e.g., part of a directory harvest attack or bounce-source attack) by determining the recipient email address of the email and the Internet Protocol (IP) address of the source of the email. When the server computer determines that the email is malicious, the server computer may reject the email by sending a non-deterministic response to the source of the email. The non-deterministic response may include an error message that is different from the actual reason why the email is being rejected. The rejection may be sent as an immediate reply or postponed, for example.
    • 在一个实施例中,服务器计算机通过确定电子邮件的接收者电子邮件地址和互联网协议(IP)地址来确定进入专用计算机网络的电子邮件是否是恶意的(例如,目录收集攻击或反弹源攻击的一部分) 的电子邮件来源。 当服务器计算机确定该电子邮件是恶意的时,服务器计算机可以通过向该电子邮件的源发送非确定性响应来拒绝该电子邮件。 非确定性响应可能包括与电子邮件被拒绝的实际原因不同的错误消息。 例如,拒绝可以作为即时回复或推迟发送。
    • 4. 发明授权
    • Zero day malware scanner
    • 零天恶意软件扫描仪
    • US08375450B1
    • 2013-02-12
    • US12573300
    • 2009-10-05
    • Jonathan James OliverCheng-Lin HouLili DiaoYiFun LiangJennifer Rihn
    • Jonathan James OliverCheng-Lin HouLili DiaoYiFun LiangJennifer Rihn
    • G06F21/00
    • H04L63/1416G06F21/564G06F21/565G06F21/567
    • A training model for malware detection is developed using common substrings extracted from known malware samples. The probability of each substring occurring within a malware family is determined and a decision tree is constructed using the substrings. An enterprise server receives indications from client machines that a particular file is suspected of being malware. The suspect file is retrieved and the decision tree is walked using the suspect file. A leaf node is reached that identifies a particular common substring, a byte offset within the suspect file at which it is likely that the common substring begins, and a probability distribution that the common substring appears in a number of malware families. A hash value of the common substring is compared (exact or approximate) against the corresponding substring in the suspect file. If positive, a result is returned to the enterprise server indicating the probability that the suspect file is a member of a particular malware family.
    • 使用从已知恶意软件样本中提取的常见子串开发恶意软件检测的培训模型。 确定在恶意软件系列内发生每个子串的概率,并使用该子串构建一个决策树。 企业服务器从客户机接收到特定文件被怀疑是恶意软件的指示。 检索可疑文件,并使用可疑文件行进决策树。 到达一个叶节点,标识一个特定的共同子串,可疑文件中可能是公共子串开始的字节偏移量,以及常见子字符串出现在多个恶意软件系列中的概率分布。 将公共子串的哈希值与可疑文件中的相应子字符串进行比较(精确或近似)。 如果为肯定,则返回给企业服务器的结果,指示可疑文件是特定恶意软件系列成员的概率。