会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Automatically verifying that anti-phishing URL signatures do not fire on legitimate web sites
    • 自动验证反网络钓鱼URL签名不会在合法网站上触发
    • US07831611B2
    • 2010-11-09
    • US11905330
    • 2007-09-28
    • Guy RobertsJohn SargentDallas EngelkenChris BartonNick Kelly
    • Guy RobertsJohn SargentDallas EngelkenChris BartonNick Kelly
    • G06F7/00
    • G06F17/30867
    • A method and computer program product prevent false positives from occurring by reducing or preventing legitimate web site content from triggering matches to phishing black lists, but provides time and cost savings over manual review of black lists. A method implemented in a computer system for detecting false positives among a plurality of search patterns of web sites that include illegitimate content comprises accessing a first page of a legitimate web site, obtaining all links included in the first page, for each link included in the first page that points to a page on the web site, determining whether the link matches at least one of the plurality of search patterns, and for each link that matches the search pattern, indicating that the search pattern is a false positive.
    • 一种方法和计算机程序产品通过减少或防止合法网站内容触发匹配到网络钓鱼黑名单来防止发生误报,但与黑名单的手动审查相比,可以节省时间和成本。 一种在计算机系统中实现的用于检测包括非法内容的网站的多个搜索模式中的假阳性的方法包括访问合法网站的第一页面,获得包括在第一页面中的每个链接的所有链接,包括在 第一页面,其指向网站上的页面,确定链接是否匹配多个搜索模式中的至少一个,以及与搜索模式匹配的每个链接,指示搜索模式是假阳性。
    • 10. 发明申请
    • NEGATIVE LIGHT-WEIGHT RULES
    • 负重轻重规则
    • US20130312098A1
    • 2013-11-21
    • US13476869
    • 2012-05-21
    • Aditya KapoorGuy Roberts
    • Aditya KapoorGuy Roberts
    • G06F21/00
    • G06F21/56G06F21/554
    • A method for securing an electronic device includes, at a level below all of the operating systems of an electronic device, trapping a first attempt and second attempt to access sensitive system resources of the electronic device. The method also includes identifying the first attempt and second attempt as representing a potential malware attack, comparing the sequence of the first attempt and second attempt against a first anti-malware rule, and, based on the comparison of the sequence of the first attempt and second attempt against the first anti-malware rule, allowing the second attempt. The first attempt and second attempt originate from code of the same operating entity. The first anti-malware rule includes a requirement of a sequence of attempts including the first attempt followed by the second attempt.
    • 一种用于固定电子设备的方法包括在电子设备的所有操作系统下方的级别上,捕获第一尝试和第二次尝试来访问电子设备的敏感系统资源。 该方法还包括将第一尝试和第二尝试识别为表示潜在的恶意软件攻击,将第一尝试和第二尝试的顺序与第一反恶意软件规则进行比较,并且基于第一尝试的顺序与 第二次尝试反对第一个反恶意软件规则,允许第二次尝试。 第一次尝试和第二次尝试来自相同操作实体的代码。 第一个反恶意软件规则包括一系列尝试的要求,包括第一次尝试,然后是第二次尝试。