会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明申请
    • MOBILE MALICIOUS SOFTWARE MITIGATION
    • 移动恶意软件减轻
    • US20120233694A1
    • 2012-09-13
    • US13045916
    • 2011-03-11
    • Arati BaligaBaris CoskunChristopher Van Wart
    • Arati BaligaBaris CoskunChristopher Van Wart
    • G06F21/00
    • G06F21/568H04L2463/144H04W12/12
    • Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification.
    • 提供了无线网络和/或移动设备上恶意软件的缓解。 提供了一种移动恶意软件缓解组件,其获得呈现恶意软件行为的互联网协议地址,恶意软件行为的简档以及恶意软件行为的时间。 恶意软件缓解组件可以确定在其呈现恶意软件行为时分配了因特网协议地址的移动设备的身份,并将该配置文件发送到移动设备。 此外,恶意软件缓解组件确定对于移动设备的互联网协议地址的分配持续时间是否足以进行肯定识别。
    • 9. 发明授权
    • Mobile malicious software mitigation
    • 移动恶意软件缓解
    • US08695095B2
    • 2014-04-08
    • US13045916
    • 2011-03-11
    • Arati BaligaBaris CoskunChristopher Van Wart
    • Arati BaligaBaris CoskunChristopher Van Wart
    • H04L29/06G06F15/16
    • G06F21/568H04L2463/144H04W12/12
    • Mitigation of malicious software in wireless networks and/or on mobile devices is provided. A mobile malicious software mitigation component is provided that obtains an internet protocol address that is exhibiting malicious software behavior, a profile of the malicious software behavior, and a time of the malicious software behavior. The malicious software mitigation component can determine an identity of a mobile device that was assigned the internet protocol address during the time it was exhibiting malicious software behavior, and transmit the profile to the mobile device. In addition, the malicious software mitigation component determine if the duration of the assignment of the internet protocol address to the mobile device is sufficient for positive identification.
    • 提供了无线网络和/或移动设备上恶意软件的缓解。 提供了一种移动恶意软件缓解组件,其获得呈现恶意软件行为的互联网协议地址,恶意软件行为的简档以及恶意软件行为的时间。 恶意软件缓解组件可以确定在其呈现恶意软件行为时分配了因特网协议地址的移动设备的身份,并将该配置文件发送到移动设备。 此外,恶意软件缓解组件确定对于移动设备的互联网协议地址的分配持续时间是否足以进行肯定识别。
    • 10. 发明授权
    • Peer-to-peer (P2P) botnet tracking at backbone level
    • 骨干级别的点对点(P2P)僵尸网络跟踪
    • US08627473B2
    • 2014-01-07
    • US13155761
    • 2011-06-08
    • Baris CoskunArati Baliga
    • Baris CoskunArati Baliga
    • G06F21/00H04L29/06
    • H04L63/1425
    • A method, computer-readable medium, and system for analyzing backbone traffic to determine compromised hosts from among hosts on a network are provided. The backbone traffic includes data flows. Each of the data flows is analyzed to determine peer-to-peer data flows from among the data flows. Each of the peer-to-peer data flows is one of the data flows having a source address and a destination address that are each unassociated with a domain name. The peer-to-peer data flows are analyzed to determine the compromised hosts from among the hosts. Each of the compromised hosts is interconnected with another of the compromised hosts via at least one of the peer-to-peer data flows.
    • 提供了一种用于分析骨干流量以从网络中的主机之间确定受损主机的方法,计算机可读介质和系统。 骨干流量包括数据流。 分析每个数据流以确定数据流中的对等数据流。 每个对等数据流是具有源地址和目的地地址的数据流之一,每个数据流都与域名不相关。 分析对等数据流,以确定主机之间的受损主机。 每个受感染的主机通过至少一个对等数据流与另一个被入侵的主机互连。