会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • SYSTEM AND METHOD OF APPLYING GLOBALLY UNIQUE IDENTIFIERS TO RELATE DISTRIBUTED DATA SOURCES
    • 应用全球唯一标识符来分配分布式数据源的系统和方法
    • US20100037161A1
    • 2010-02-11
    • US12189311
    • 2008-08-11
    • Tyron Jerrod StadingRyan RozichRoji John
    • Tyron Jerrod StadingRyan RozichRoji John
    • G06F17/30G06F7/06G06F3/048
    • G06F17/30592G06F17/3043G06F17/30557
    • In a particular embodiment, a method includes sending a text string from a source device to a destination device. The destination device includes a unique identifier repository having a plurality of globally unique identifiers mapped text strings, relationship data defining associations between the plurality of globally unique identifiers, and meta-data related to the text string. Each of the plurality of globally unique identifiers includes a data value that is shared by a plurality of data sources as an identifier associated with information related to the text string. The method further includes receiving data including one or more globally unique identifiers, associated relationship data, and associated meta-data from the destination device at the source device in response to sending the text string. Additionally, the method includes storing the received data at a memory of the source device for use in searching and relating search results received from multiple data sources.
    • 在特定实施例中,一种方法包括将文本串从源设备发送到目的地设备。 目的地设备包括具有多个全球唯一标识符映射的文本串的唯一标识库,定义多个全局唯一标识符之间的关联的关系数据以及与文本串相关的元数据。 多个全局唯一标识符中的每一个包括由多个数据源共享的数据值作为与文本串相关的信息相关联的标识符。 该方法还包括响应于发送文本串,从源设备处接收包括来自目的地设备的一个或多个全局唯一标识符,关联关系数据和相关联的元数据的数据。 此外,该方法包括将接收的数据存储在源设备的存储器中,以用于搜索和关联从多个数据源接收的搜索结果。
    • 7. 发明授权
    • Method and apparatus for detecting password attacks using modeling techniques
    • 使用建模技术检测密码攻击的方法和装置
    • US07386892B2
    • 2008-06-10
    • US10621928
    • 2003-07-17
    • Michael GilfixFoluso Olaiya OkunseindeTyron Jerrod Stading
    • Michael GilfixFoluso Olaiya OkunseindeTyron Jerrod Stading
    • G06F7/04H04K1/00
    • G06F21/31
    • Provided is an apparatus and method for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile, then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes are from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.
    • 提供了一种用于检测欺诈口令的装置和方法,使得计算机入侵尝试可以与授权用户不正确地输入其密码区分开来。 实际的密码与计算机键盘映射,结果数据存储在内存中。 将输入的密码的配置文件与存储的配置文件进行比较。 如果输入的密码的配置文件与存储的配置文件显着不同,则登录尝试将被标记为尝试的入侵。 在本发明的一个实施例中,密码根据随后的击键彼此之间的距离被映射。 不同的实施例可以具有不同的映射方案。 例如,映射数据可以对应于对应于当预期另一个角色时特定字符被错误地键入的可能性的统计数据。
    • 9. 发明授权
    • System and method for remote code integrity in distributed systems
    • 分布式系统中远程代码完整性的系统和方法
    • US06986041B2
    • 2006-01-10
    • US10383852
    • 2003-03-06
    • Michael A. GilfixTyron Jerrod Stading
    • Michael A. GilfixTyron Jerrod Stading
    • H04L9/00
    • G06F21/52G06F2221/2101G06F2221/2107G06F2221/2143
    • A system and method for remote code integrity in distributed systems is presented. A server sends encrypted remote code to a client. The client receives the encrypted remote code and a key agent from the server. The key agent includes a key to decrypt the remote code. The client uses the key to decrypt the encrypted remote code and stores the decrypted remote code in internal memory. The key agent uses a second key included in the key agent to re-encrypt the decrypted remote code and stores the re-encrypted remote code in non-volatile memory. The client executes the decrypted remote code located in internal memory. Once the client is finished executing the decrypted remote code, the client overwrites the keys and deletes the old encrypted code.
    • 提出了分布式系统中远程代码完整性的系统和方法。 服务器向客户端发送加密的远程代码。 客户端从服务器接收加密的远程代码和密钥代理。 密钥代理包括解密远程代码的密钥。 客户端使用密钥解密加密的远程代码,并将解密的远程代码存储在内部存储器中。 密钥代理使用密钥代理中包含的第二个密钥来重新加密解密的远程代码,并将重新加密的远程代码存储在非易失性存储器中。 客户端执行位于内部存储器中的解密的远程代码。 一旦客户端完成解密的远程代码的执行,客户端将覆盖密钥并删除旧的加密代码。