会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Lockbox for mitigating same origin policy failures
    • Lockbox用于减轻相同的原始策略失败
    • US08782797B2
    • 2014-07-15
    • US12175264
    • 2008-07-17
    • Jiahe Helen WangXiaofeng FanShuo Chen
    • Jiahe Helen WangXiaofeng FanShuo Chen
    • G06F7/04
    • G06F21/55H04L63/1416
    • Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy.
    • 提供了管理在计算环境中发生的相同来源策略(SOP)故障的系统和方法。 在说明性实现中,示例性计算环境包括锁箱模块,以及指令集,其包括指示锁箱模块处理数据和/或计算代表所选择的操作/特征的应用执行命令的至少一个指令,以及根据 一个选定的SOP管理模式。 在说明性实现中,SOP管理范例包括部署“锁箱”计算应用元件的一个或多个指令,允许管理,监视和控制可在相同原始策略下操作的计算应用特征/操作。
    • 2. 发明申请
    • LOCKBOX FOR MITIGATING SAME ORIGIN POLICY FAILURES
    • 用于减轻相同原因的LOCKBOX策略失败
    • US20100017883A1
    • 2010-01-21
    • US12175264
    • 2008-07-17
    • Jiahe Helen WangXiaofeng FanShuo Chen
    • Jiahe Helen WangXiaofeng FanShuo Chen
    • G06F21/00
    • G06F21/55H04L63/1416
    • Systems and methods to manage same-origin-policy (SOP) failures that occur in a computing environment are provided. In an illustrative implementation, an exemplary computing environment comprises a lockbox module, and an instruction set comprising at least one instruction directing the lockbox module to process data and/or computing application execution commands representative of and a request for a selected operation/feature according to a selected SOP management paradigm. In the illustrative implementation, the SOP management paradigm comprises one or more instructions to deploy a “lockbox” computing application element allowing for the management, monitoring, and control of computing application features/operations operable under a same origin policy.
    • 提供了管理在计算环境中发生的相同来源策略(SOP)故障的系统和方法。 在说明性实现中,示例性计算环境包括锁箱模块,以及指令集,其包括指示锁箱模块处理数据和/或计算代表所选择的操作/特征的应用执行命令的至少一个指令,以及根据 一个选定的SOP管理模式。 在说明性实现中,SOP管理范例包括部署“锁箱”计算应用元件的一个或多个指令,允许管理,监视和控制可在相同原始策略下操作的计算应用特征/操作。
    • 8. 发明申请
    • Systematic Approach to Uncover GUI Logic Flaws
    • 揭示GUI逻辑缺陷的系统方法
    • US20080127341A1
    • 2008-05-29
    • US11772085
    • 2007-06-29
    • Shuo ChenJiahe Helen WangYi-Min Wang
    • Shuo ChenJiahe Helen WangYi-Min Wang
    • H04L9/32G06F3/00
    • G06F11/3608G06F21/577G06F21/83
    • To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    • 为了实现端到端的安全性,如果图形用户界面(GUI)的完整性受到损害,则传统的机器对机器的安全措施是不够的。 GUI逻辑缺陷是由GUI实现中的逻辑缺陷引起的一类软件漏洞。 这里描述的发明是使用系统推理方法揭露这些缺陷的技术。 该技术的主要步骤包括:(1)将视觉不变量映射到程序不变; (2)对程序逻辑,用户动作和执行上下文进行正式建模,并系统地探索违反程序不变的可能性; (3)根据探索找到真正的欺骗攻击。
    • 9. 发明授权
    • Systematic approach to uncover GUI logic flaws
    • 发现GUI逻辑缺陷的系统方法
    • US08125669B2
    • 2012-02-28
    • US11772085
    • 2007-06-29
    • Shuo ChenYi-Min WangJiahe Helen Wang
    • Shuo ChenYi-Min WangJiahe Helen Wang
    • G06F15/00G06F11/00
    • G06F11/3608G06F21/577G06F21/83
    • To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    • 为了实现端到端的安全性,如果图形用户界面(GUI)的完整性受到损害,则传统的机器对机器的安全措施是不够的。 GUI逻辑缺陷是由GUI实现中的逻辑缺陷引起的一类软件漏洞。 这里描述的发明是使用系统推理方法揭露这些缺陷的技术。 该技术的主要步骤包括:(1)将视觉不变量映射到程序不变; (2)对程序逻辑,用户动作和执行上下文进行正式建模,并系统地探索违反程序不变的可能性; (3)根据探索找到真正的欺骗攻击。
    • 10. 发明授权
    • Systematic approach to uncover visual ambiguity vulnerabilities
    • 发现视觉模糊漏洞的系统方法
    • US08539585B2
    • 2013-09-17
    • US11768134
    • 2007-06-25
    • Shuo ChenRalf SasseJiahe Helen WangYi-Min Wang
    • Shuo ChenRalf SasseJiahe Helen WangYi-Min Wang
    • G06F21/00
    • G06F11/3608G06F21/577G06F21/83
    • To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    • 为了实现端到端的安全性,如果图形用户界面(GUI)的完整性受到损害,则传统的机器对机器的安全措施是不够的。 GUI逻辑缺陷是由GUI实现中的逻辑缺陷引起的一类软件漏洞。 这里描述的发明是使用系统推理方法揭露这些缺陷的技术。 该技术的主要步骤包括:(1)将视觉不变量映射到程序不变; (2)对程序逻辑,用户动作和执行上下文进行正式建模,并系统地探索违反程序不变的可能性; (3)根据探索找到真正的欺骗攻击。