会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Systems and methods for determining a file set
    • 用于确定文件集的系统和方法
    • US08706745B1
    • 2014-04-22
    • US12130839
    • 2008-05-30
    • Shaun CooleyWilliam E. SobelBruce McCorkendale
    • Shaun CooleyWilliam E. SobelBruce McCorkendale
    • G06F7/00G06F17/30
    • G06F21/564
    • A computer-implemented method for determining a file set may include identifying a file set and identifying a key file for the file set. The method may also include transmitting a key-file identifier to a second computing system. A first computing system may receive first and second file identifiers from a second computing system. The first computing system may determine whether the file set comprises a file identified by the first file identifier, and whether the file set comprises a file identified by the second file identifier. The method also includes transmitting a result of the determination to the second computing system. A method for determining a file set on a second computing device is also disclosed. Corresponding systems and computer-readable media are also disclosed.
    • 用于确定文件集的计算机实现的方法可以包括识别文件集并且识别文件集的密钥文件。 该方法还可以包括将密钥文件标识符发送到第二计算系统。 第一计算系统可以从第二计算系统接收第一和第二文件标识符。 第一计算系统可以确定文件集是否包括由第一文件标识符标识的文件,以及文件集是否包括由第二文件标识符标识的文件。 该方法还包括将确定的结果发送给第二计算系统。 还公开了一种用于确定在第二计算设备上的文件集的方法。 还公开了相应的系统和计算机可读介质。
    • 3. 发明授权
    • Extending user account control to groups and multiple computers
    • 将用户帐户控制扩展到组和多台计算机
    • US07941443B1
    • 2011-05-10
    • US12124979
    • 2008-05-21
    • William E. SobelBrian HernackiShaun Cooley
    • William E. SobelBrian HernackiShaun Cooley
    • G06F7/00G06F17/30
    • G06F21/6218G06F2221/2141G06F2221/2149
    • User account control (such as the UAC component of Windows Vista) is extended to enable users to allow their decisions on how to respond to managed events to be applied to equivalent events for groups, without any further prompting. When a managed event first occurs, the user is presented with an extended dialog prompting for input not only on whether to allow the event for just the user, but also on whether to allow the event for any groups the user manages. Managed groups can comprise all of the user's computers, or multiple user accounts the user manages. The user's response to the prompt and information concerning the managed event are stored. Matching events within a group context are recognized, and appropriate stored responses are automatically applied, without any additional user prompting.
    • 扩展了用户帐户控制(如Windows Vista的UAC组件),使用户能够允许他们决定如何响应被管理事件应用于组的等效事件,而无需进一步提示。 当首次发生托管事件时,向用户显示一个扩展对话框,提示不仅要输入用户的事件,还要确定是否允许用户管理的任何组的事件。 被管理的组可以包括用户管理的所有用户的计算机或多个用户帐户。 存储用户对提示的响应和有关被管理事件的信息。 识别组内的匹配事件,并自动应用适当的存储响应,而无需任何其他用户提示。
    • 4. 发明授权
    • Collection of confidential information dissemination statistics
    • 收集机密信息传播统计资料
    • US08214907B1
    • 2012-07-03
    • US12036773
    • 2008-02-25
    • William E. SobelShaun Cooley
    • William E. SobelShaun Cooley
    • G06F12/14
    • H04L63/1416G06F21/51G06F2221/2119
    • Client computers track visited websites and monitor confidential information transmitted to the visited websites. Upon subsequent identification of a website as malicious or compromised, it is determined whether the unsecure website was visited, and if so, whether any confidential information was exposed to the unsecure website. Clients compile statistical reports concerning confidential information transmitted to unsecure websites, and provide these reports to a central server. The central server uses statistical reports received from a wide distribution of clients to maintain comprehensive statistical data indicating exposure of confidential information to unsecure websites. This comprehensive statistical data can be used for purposes such as damage assessment, trend tracking and profiling of suspected malicious websites.
    • 客户端计算机跟踪访问的网站并监视发送到访问的网站的机密信息。 随后将网站识别为恶意或受到损害时,确定是否访问了不安全的网站,如果是,是否将隐私信息暴露给不安全的网站。 客户编制有关传递到不安全网站的机密信息的统计报告,并将这些报告提供给中央服务器。 中央服务器使用从广泛分布的客户端收到的统计报告,以维护全面的统计数据,表明将机密信息暴露给不安全的网站。 这种综合统计数据可用于损害评估,趋势跟踪和疑似恶意网站的分析等目的。
    • 5. 发明授权
    • Streaming distribution of file data based on predicted need
    • 根据预测需要流式传输文件数据
    • US08214839B1
    • 2012-07-03
    • US12059777
    • 2008-03-31
    • Shaun CooleyRandall Richards CookWilliam E. Sobel
    • Shaun CooleyRandall Richards CookWilliam E. Sobel
    • G06F13/00
    • H04L67/025G06F17/30132G06F17/30203H04L67/18
    • File resources that are most likely to be used on a target computer are proactively cached, so that the resources are available before they are needed. This greatly reduces or eliminates associated user wait times. It is determined which file resources are most likely to be used, the cost of transmitting them to the cache, the cost of storing them in the cache and the amount of cache space available. Based on a weighted balancing analysis of factors such as these, specific file resources are proactively streamed for use on the target computer. The determination as to which resources are most likely to be used can be based on a variety of factors, such as usage patterns, schedule based information, user and group based information, target computer and network information, etc.
    • 在目标计算机上最有可能使用的文件资源被主动缓存,以便资源在需要之前可用。 这大大减少或消除了相关联的用户等待时间。 确定哪些文件资源最有可能被使用,将它们发送到高速缓存的成本,将其存储在高速缓存中的成本以及可用的高速缓存空间量。 基于对这些因素的加权平衡分析,主动流式传输特定文件资源以在目标计算机上使用。 关于哪些资源最有可能被使用的决定可以基于各种因素,例如使用模式,基于时间表的信息,基于用户和组的信息,目标计算机和网络信息等。
    • 6. 发明授权
    • Anti-phishing early warning system based on end user data submission statistics
    • 基于最终用户数据提交统计的反网络钓鱼预警系统
    • US08321934B1
    • 2012-11-27
    • US12115352
    • 2008-05-05
    • Shaun CooleyWilliam E. Sobel
    • Shaun CooleyWilliam E. Sobel
    • G06F11/00
    • G06F21/56
    • Websites used for phishing are detected by analyzing end user confidential data submission statistics. A central process receives data indicating confidential information submitted to websites from a plurality of user computers. The received data is aggregated and analyzed, for example through statistical profiling. Through the analysis of the aggregated data, anomalous behavior concerning submission of confidential information to websites is detected, such is an unexpected, rapid increase in the amount of confidential information submitted to a given website. Responsive to detecting the anomalous behavior, further action is taken to protect users from submitting confidential information to that website. For example, an alert can be sent, a protective measure against the site can be published, the site can be added to a blacklist or a procedure to have the site shut down can be initiated.
    • 通过分析最终用户机密数据提交统计信息来检测用于网络钓鱼的网站。 中央处理从多个用户计算机接收指示提交给网站的机密信息的数据。 收集的数据被聚合和分析,例如通过统计分析。 通过对汇总数据的分析,检测到向网站提交机密信息的异常行为,这是提交给给定网站的机密信息量意外迅速增加。 响应检测异常行为,采取进一步行动保护用户不向机构提交机密信息。 例如,可以发送一个警报,可以发布对该站点的保护措施,该站点可以添加到黑名单或程序中以使站点关闭可以启动。
    • 7. 发明授权
    • Secure app ecosystem with key and data exchange according to enterprise information control policy
    • 根据企业信息化管理政策,密钥和数据交换安全应用生态系统
    • US09286477B2
    • 2016-03-15
    • US13598248
    • 2012-08-29
    • William E. SobelThomas Jeffrey EnderwickBruce McCorkendale
    • William E. SobelThomas Jeffrey EnderwickBruce McCorkendale
    • G06F11/30G06F21/60H04L29/06G06F17/30
    • G06F21/606G06F17/30238G06F21/604H04L63/0428H04L63/20
    • Multiple apps of an ecosystem on a computer securely exchange encrypted data according to an information control policy of an enterprise, without allowing unauthorized access from outside of the ecosystem. An ecosystem agent creates an ecosystem directory, which contains policy information and identification information concerning each specific app in the ecosystem, including the ecosystem agent. Each ecosystem app generates an asymmetric key pair, the public key of which it shares only with apps in the ecosystem through the directory. The ecosystem agent's private key is used to encrypt the directory. Data is securely communicated between apps in the ecosystem, by encrypting and decrypting messages and data objects with the appropriate ecosystem app keys. Each specific app in the ecosystem complies with enterprise information control policy. Ecosystem apps can read a policy from the directory, and receive policy updates from the enterprise.
    • 计算机上生态系统的多个应用程序根据企业的信息控制策略安全地交换加密数据,而不允许从生态系统外面进行未经授权的访问。 生态系统代理创建一个生态系统目录,其中包含有关生态系统中每个特定应用程序(包括生态系统代理)的策略信息和标识信息。 每个生态系统应用程序都会生成一个非对称密钥对,其公钥仅通过目录与生态系统中的应用共享。 生态系统代理的私钥用于加密目录。 通过使用适当的生态系统应用程序密钥加密和解密消息和数据对象,可以在生态系统中的应用程序之间安全地传送数据。 生态系统中的每个具体应用都符合企业信息控制政策。 生态系统应用程序可以从目录中读取策略,并从企业接收策略更新。