会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Systems and methods for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions
    • 使用信誉信息评估通过洪流交易获得的文件的可信赖性的系统和方法
    • US08627463B1
    • 2014-01-07
    • US12880581
    • 2010-09-13
    • Adam GlickNicholas GrafSpencer Smith
    • Adam GlickNicholas GrafSpencer Smith
    • G06F11/00
    • H04L63/1408G06F17/30206G06F21/56G06F2221/033H04L63/12H04L63/1416H04L63/145
    • A computer-implemented method for using reputation information to evaluate the trustworthiness of files obtained via torrent transactions may include (1) identifying a torrent file that includes metadata for facilitating a torrent transaction for obtaining a target file via a peer-to-peer file-sharing protocol, (2) identifying at least one entity involved in the torrent transaction, (3) obtaining reputation information associated with the entity involved in the torrent transaction, wherein the reputation information identifies a community's opinion on the trustworthiness of the entity, (4) determining, based at least in part on the reputation information associated with the entity involved in the torrent transaction, that the target file represents a potential security risk, and then (5) performing a security action on the target file. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于使用信誉信息来评估通过种子事务获得的文件的可信赖性的计算机实现的方法可以包括(1)识别包括元数据的torrent文件,以便于通过点对点文件获取目标文件的洪流事务, (2)确定洪流交易中涉及到的至少一个实体,(3)获取与洪流交易相关的实体相关的信誉信息,其中信誉信息识别社区对该实体的可信度的意见(4 )至少部分地基于与所述洪流事务中涉及的实体相关联的信誉信息确定所述目标文件表示潜在的安全风险,然后(5)对所述目标文件执行安全动作。 还公开了各种其它方法,系统和计算机可读介质。
    • 4. 发明授权
    • Systems and methods for automatically detecting and preventing phishing attacks
    • 用于自动检测和防止网络钓鱼攻击的系统和方法
    • US08776196B1
    • 2014-07-08
    • US13557051
    • 2012-07-24
    • Ian OliverAdam GlickNicholas GrafSpencer Smith
    • Ian OliverAdam GlickNicholas GrafSpencer Smith
    • G06F7/04G06F12/14G06F17/30H04L29/06
    • H04L63/1483H04L63/1408
    • A computer-implemented method for automatically detecting and preventing phishing attacks may include (1) maintaining a credentials store for a user of the computing device that identifies both at least one known-legitimate website and credentials associated with the known-legitimate website, (2) detecting an attempt by the user to enter the same credentials that are associated with the known-legitimate website into a new website that is not associated with the credentials in the credentials store, and then, prior to allowing the credentials to pass to the new website, (3) automatically warning the user that the new website potentially represents an attempt to phish the credentials associated with the known-legitimate website from the user. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于自动检测和防止网络钓鱼攻击的计算机实现的方法可以包括(1)维护用于识别至少一个已知合法网站和与已知合法网站相关联的证书的计算设备的用户的凭证存储(2) )检测用户尝试将与已知合法网站相关联的相同凭证输入到与凭证存储器中的凭证不相关联的新网站,然后在允许凭据传递到新的 网站,(3)自动向用户发出警告,表示新网站可能代表尝试从用户那里窃取与已知合法网站相关联的凭据。 还公开了各种其它方法,系统和计算机可读介质。
    • 7. 发明授权
    • Signature creation for malicious network traffic
    • 恶意网络流量的签名创建
    • US08782790B1
    • 2014-07-15
    • US12709432
    • 2010-02-19
    • Spencer SmithAdam GlickNicholas GrafUriel Mann
    • Spencer SmithAdam GlickNicholas GrafUriel Mann
    • H04L29/06
    • H04L63/1441H04L63/1416
    • An endpoint on a network uses detection data to detect a malicious software attack. The endpoint identifies content associated with the attack, such as a component of a web page, and generates a description of the content. The endpoint sends the description to a security server. The security server analyzes the content and identifies characteristics of the content that are present when the content is carried by network traffic. The security server generates a traffic signature that specifies the identified characteristics and provides the traffic signature to inspection points. The inspection points, in turn, use the traffic signature to examine network traffic passing through the inspection points to detect network traffic carrying the content. The attack detection at the endpoint thus informs the traffic signature-based detection at the inspection points and reduces the spread of malicious software.
    • 网络上的端点使用检测数据来检测恶意软件攻击。 端点识别与攻击相关联的内容,例如网页的组件,并生成内容的描述。 端点将说明发送到安全服务器。 安全服务器分析内容并识别内容由网络流量携带时存在的内容的特征。 安全服务器生成指定已识别特征的流量签名,并向检查点提供流量签名。 检查点依次使用流量签名来检查通过检查点的网络流量,以检测携带内容的网络流量。 因此,端点的攻击检测通知了检查点的基于流量签名的检测,减少了恶意软件的传播。
    • 8. 发明授权
    • Systems and methods for locating malware
    • 查找恶意软件的系统和方法
    • US08621632B1
    • 2013-12-31
    • US12470312
    • 2009-05-21
    • Spencer SmithAdam GlickNicholas Graf
    • Spencer SmithAdam GlickNicholas Graf
    • H04L29/06
    • G06F21/566H04L63/1425
    • A computer-implemented method for locating malware may include identifying a malicious behavior in a computing system. The computer-implemented method may also include determining that the malicious behavior arises from a set of interrelated executable objects. The computer-implemented method may further include identifying an executable object recently added to the set of interrelated executable objects. The computer-implemented method may additionally include attributing the malicious behavior to the recently added executable object based on when the recently added executable object was added to the set of interrelated executable objects. The computer-implemented method may also include performing a security action on the recently added executable object. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于定位恶意软件的计算机实现的方法可以包括识别计算系统中的恶意行为。 计算机实现的方法还可以包括确定恶意行为是由一组相互关联的可执行对象产生的。 计算机实现的方法还可以包括识别最近添加到相关联的可执行对象集合中的可执行对象。 计算机实现的方法可以另外包括基于最近添加的可执行对象何时添加到相关联的可执行对象的集合,将恶意行为归因于最近添加的可执行对象。 计算机实现的方法还可以包括对最近添加的可执行对象执行安全动作。 还公开了各种其它方法,系统和计算机可读介质。
    • 9. 发明授权
    • Systems and methods for updating parental-control settings
    • 用于更新家长控制设置的系统和方法
    • US08418223B1
    • 2013-04-09
    • US12838938
    • 2010-07-19
    • Spencer SmithAdam GlickNicholas Graf
    • Spencer SmithAdam GlickNicholas Graf
    • G06F17/00G06F15/16
    • G09B7/02
    • A computer-implemented method may include establishing, within a parental-control software system, an academic-performance policy that defines how academic performance of a student affects at least one parental-control setting enforced on a computing system accessible to the student. The computer-implemented method may also include receiving, via an electronic communication from a school of the student, grade information that indicates the student's academic performance. The computer-implemented method may further include applying the academic-performance policy by updating the parental-control setting commensurate with the student's academic performance. In addition, the computer-implemented method may include detecting an attempt by the student to access a resource of the computing system and applying the updated parental-control setting to control the student's access to the resource of the computing system.
    • 计算机实现的方法可以包括在家长控制软件系统内建立学术性能策略,其定义学生的学业成绩如何影响学生可访问的计算系统上强制执行的至少一个家长控制设置。 计算机实现的方法还可以包括通过来自学生的学校的电子通信来接收指示学生的学业成绩的成绩信息。 计算机实现的方法还可以包括通过更新与学生的学业成绩相称的父母控制设置来应用学业成绩政策。 此外,计算机实现的方法可以包括检测学生访问计算系统的资源的尝试并应用更新的家长控制设置来控制学生对计算系统的资源的访问。