会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Antivirus stand-alone network or internet appliance and methods therefor
    • 防毒软件独立网络或互联网设备及其方法
    • US08327446B2
    • 2012-12-04
    • US10138478
    • 2002-05-06
    • Jeremy LiangJin-Shi LeeTsung-Lin Yu
    • Jeremy LiangJin-Shi LeeTsung-Lin Yu
    • G06F11/00
    • H04L63/145G06F21/56H04L63/16
    • The invention provides an antivirus network or Internet appliance and methods therefor. A preferred embodiment of the Internet appliance according to the invention comprises an interface connecting the Internet appliance to a terminal, a memory, and a network connection connecting the Internet appliance to a network (such as a wide area network (WAN) or the Internet) wherein data in the network are operable with a corresponding network protocol (such as TCP/IP). Protocol-level programs are stored in the memory for receiving data being transmitted from the network to the terminal through the Internet appliance wherein the protocol-level programs are compatibly operable with the network protocol. Application-level antivirus programs are stored in the memory for detecting computer viruses in the received data serving as a firewall against the detected computer viruses for the terminal. The Internet appliance according to this particular embodiment of the invention further includes a processor (such as a central processor unit or CPU) and an operating system for implementing the protocol-level programs and the antivirus programs, wherein the antivirus programs are advantageously transparent to the terminal.
    • 本发明提供了一种防病毒网络或因特网设备及其方法。 根据本发明的因特网设备的优选实施例包括将因特网设备连接到终端的接口,存储器和将因特网设备连接到网络(例如广域网(WAN)或因特网)的网络连接) 其中网络中的数据可以使用相应的网络协议(例如TCP / IP)操作。 协议级程序存储在存储器中,用于接收通过因特网设备从网络发送到终端的数据,其中协议级程序与网络协议兼容地操作。 应用级防病毒程序存储在存储器中,用于检测接收到的数据中的计算机病毒,作为防火墙的检测计算机病毒。 根据本发明的该特定实施例的因特网设备还包括处理器(例如中央处理器单元或CPU)和用于实现协议级程序和防病毒程序的操作系统,其中防病毒程序有利地对 终奌站。
    • 3. 发明授权
    • Generation of debug information for debugging a network security appliance
    • 生成用于调试网络安全设备的调试信息
    • US07660412B1
    • 2010-02-09
    • US11298330
    • 2005-12-09
    • Jin-Shi Lee
    • Jin-Shi Lee
    • G06F9/44
    • G06F11/362
    • Debugging of a network security appliance is facilitated by allowing for generation of debug information in a user-friendly manner. In one embodiment, the network security appliance automatically detects a presence of a file in a removable non-volatile memory and, in response, places at least one of its components in debug mode. This allows the component to write debug information to the removable non-volatile memory. Removal of the removable non-volatile memory from the network security appliance automatically triggers placement of the component in non-debug mode. The debug information generated in the network security appliance may be forwarded to a server computer for analysis.
    • 通过允许以用户友好的方式生成调试信息来促进网络安全设备的调试。 在一个实施例中,网络安全设备自动检测文件在可移动非易失性存储器中的存在,并且作为响应,将其组件中的至少一个置于调试模式。 这允许组件将调试信息写入可移动非易失性存储器。 从网络安全设备中删除可移动非易失性存储器会自动触发组件处于非调试模式的位置。 可以将网络安全设备中生成的调试信息转发到服务器计算机进行分析。
    • 4. 发明授权
    • Method and apparatus for protecting high availability devices from computer viruses and other malicious content
    • 用于保护高可用性设备免受计算机病毒和其他恶意内容的方法和设备
    • US08667590B1
    • 2014-03-04
    • US12212015
    • 2008-09-17
    • Jin-Shi LeeMu-Pen Tsai
    • Jin-Shi LeeMu-Pen Tsai
    • G06F11/30
    • G06F21/564H04L63/1416
    • A technique for protecting a high availability device in a computer network includes deploying an appliance between the high availability device and a network connection. The high availability device may be a device configured for a manufacturing operation, such as wafer fabrication, for example. The appliance may be a transparent security appliance with a scanning engine for scanning packets for malicious content, such as computer viruses or worms, for example. Scanning control information can be supplied to the appliance by way of either a removable storage medium or a secure server coupled to the appliance, for example. The scanning control information can include a patch update, perhaps with signatures of viruses and associated control instructions. The appliance can then block any malicious content entering the appliance in response to the scanning control information. Among other advantages, the technique allows for low-cost, plug-and-play protection of high availability devices with good scalability to larger network configurations.
    • 用于在计算机网络中保护高可用性设备的技术包括在高可用性设备和网络连接之间部署设备。 高可用性设备可以是被配置用于诸如晶片制造之类的制造操作的设备。 该设备可以是具有扫描引擎的透明安全设备,用于扫描诸如计算机病毒或蠕虫之类的恶意内容的分组。 扫描控制信息可以例如通过可移动存储介质或耦合到设备的安全服务器提供给设备。 扫描控制信息可以包括补丁更新,可能具有病毒签名和相关控制指令。 然后,设备可以阻止响应于扫描控制信息进入设备的任何恶意内容。 除了其他优点之外,该技术允许对较高网络配置具有良好可扩展性的高可用性设备的低成本,即插即用保护。
    • 5. 发明授权
    • Method and apparatus for configuring a network component
    • 用于配置网络组件的方法和装置
    • US07382779B1
    • 2008-06-03
    • US10922774
    • 2004-08-20
    • Jin-Shi Lee
    • Jin-Shi Lee
    • G06F15/173
    • H04L41/0809H04L63/1416
    • In one embodiment, a technique for configuring a network component in a computer network includes coupling the network component to a first computer and a second computer. The network component may be an appliance while the second computer may be a management server for the appliance, for example. A data unit, such as an Internet Protocol (IP) packet, can be sent from the first computer and the data unit can be observed by the appliance such that a source of the data unit may be determined. The source address of the data unit can then be adopted as an appliance address. Also, the appliance address may be forwarded from the appliance to the management server for registration. The appliance may be a transparent security appliance or device, for example. Among other advantages, the technique allows for plug-and-play accommodation of network components with good usability across different network configurations.
    • 在一个实施例中,用于在计算机网络中配置网络组件的技术包括将网络组件耦合到第一计算机和第二计算机。 例如,网络组件可以是设备,而第二计算机可以是用于设备的管理服务器。 可以从第一计算机发送诸如因特网协议(IP)分组的数据单元,并且可以由设备观察数据单元,使得可以确定数据单元的源。 然后可以将数据单元的源地址用作设备地址。 此外,设备地址可以从设备转发到管理服务器以进行注册。 该设备例如可以是透明的安全设备或设备。 除了其他优点之外,该技术允许网络组件的即插即用适应,并且在不同网络配置上具有良好的可用性。