会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Applying antimalware logic without revealing the antimalware logic to adversaries
    • 应用反恶意软件逻辑,而不会向对手揭示反恶意软件逻辑
    • US08955133B2
    • 2015-02-10
    • US13156726
    • 2011-06-09
    • Ajith KumarTimothy Jon FraserAdrian M. MarinescuMarc E. SeinfeldJack Wilson Stokes, IIIAnil Francis Thomas
    • Ajith KumarTimothy Jon FraserAdrian M. MarinescuMarc E. SeinfeldJack Wilson Stokes, IIIAnil Francis Thomas
    • G06F21/00G06F21/55G06F21/56
    • G06F21/552G06F21/566
    • The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt.
    • 主题公开涉及一种技术,通过该技术,反恶意软件检测逻辑在后端服务中被维护和操作,客户前端机器为此进行通信(查询)以用于恶意软件检测。 这样一来,后端服务就会保留一些反恶意软件技术,而不是反恶意软件作者。 后端反恶意软件检测逻辑可以基于特征选择,并且可以以比作者可追踪的恶意软件更快的方式快速更新。 噪声可能会添加到结果中,使恶意软件作者难以推断出结果背后的逻辑。 后端可能返回指示恶意软件或不是恶意软件的结果,或返回不确定的结果。 后端服务还可以检测作为尝试推断出未显示的反恶意软件检测逻辑的一部分的探测相关查询,其中响应返回噪声结果和/或为了抵制该尝试而采取的其他动作。
    • 4. 发明申请
    • Applying Antimalware Logic without Revealing the Antimalware Logic to Adversaries
    • 应用反恶意软件逻辑,而不会向对手揭示反恶意软件逻辑
    • US20120317644A1
    • 2012-12-13
    • US13156726
    • 2011-06-09
    • Ajith KumarTimothy Jon FraserAdrian M. MarinescuMarc E. SeinfeldJack Wilson Stokes, IIIAnil Francis Thomas
    • Ajith KumarTimothy Jon FraserAdrian M. MarinescuMarc E. SeinfeldJack Wilson Stokes, IIIAnil Francis Thomas
    • G06F21/00
    • G06F21/552G06F21/566
    • The subject disclosure is directed towards a technology by which antimalware detection logic is maintained and operated at a backend service, with which a customer frontend machine communicates (queries) for purposes of malware detection. In this way, some antimalware techniques are maintained at the backend service rather than revealed to antimalware authors. The backend antimalware detection logic may be based upon feature selection, and may be updated rapidly, in a manner that is faster than malware authors can track. Noise may be added to the results to make it difficult for malware authors to deduce the logic behind the results. The backend may return results indicating malware or not malware, or return inconclusive results. The backend service may also detect probing-related queries that are part of an attempt to deduce the unrevealed antimalware detection logic, with noisy results returned in response and/or other actions taken to foil the attempt.
    • 主题公开涉及一种技术,通过该技术,反恶意软件检测逻辑在后端服务中被维护和操作,客户前端机器为此进行通信(查询)以用于恶意软件检测。 这样一来,后端服务就会保留一些反恶意软件技术,而不是反恶意软件作者。 后端反恶意软件检测逻辑可以基于特征选择,并且可以以比作者可追踪的恶意软件更快的方式快速更新。 噪声可能会添加到结果中,使恶意软件作者难以推断出结果背后的逻辑。 后端可能返回指示恶意软件或不是恶意软件的结果,或返回不确定的结果。 后端服务还可以检测作为尝试推断出未显示的反恶意软件检测逻辑的一部分的探测相关查询,其响应返回的噪声结果和/或为了抵制尝试而采取的其他动作。
    • 8. 发明授权
    • Selectively scanning objects for infection by malware
    • 选择性扫描物体感染恶意软件
    • US08973135B2
    • 2015-03-03
    • US13248867
    • 2011-09-29
    • Anil Francis ThomasAdrian M. MarinescuAjith KumarJonathan M. KellerOmer Ben Bassat
    • Anil Francis ThomasAdrian M. MarinescuAjith KumarJonathan M. KellerOmer Ben Bassat
    • G06F12/14G06F21/00
    • G06F21/00G06F21/564G06F21/568
    • Techniques are described herein that are capable of selectively scanning objects for infection by malware (i.e., to determine whether one or more of the objects are infected by malware). For instance, metadata that is associated with the objects may be reviewed to determine whether update(s) have been made with regard to the objects since a determination was made that the objects were not infected by malware. An update may involve increasing a number of the objects, modifying one of the objects, etc. Objects that have been updated (e.g., added and/or modified) since the determination may be scanned. Objects that have not been updated since the determination need not necessarily be scanned. For instance, an allowance may be made to perform operations with respect to the objects that have not been updated since the determination without first scanning the objects for infection by malware.
    • 本文描述了能够选择性地扫描物体以感染恶意软件(即,确定一个或多个对象是否被恶意软件感染)的技术。 例如,可以检查与对象相关联的元数据,以确定是否已经对对象进行了更新,因为确定对象未被恶意软件感染。 更新可以涉及增加对象的数量,修改对象之一等。可以扫描自确定以来已被更新(例如,添加和/或修改)的对象。 自确定以来尚未更新的对象不必一定被扫描。 例如,可以在不首先扫描物体以感染恶意软件的情况下,进行从确定以来未进行更新的对象的操作。