会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method for detecting DNS redirects or fraudulent local certificates for SSL sites in pharming/phishing schemes by remote validation and using a credential manager and recorded certificate attributes
    • 通过远程验证和使用凭证管理器和记录的证书属性来检测PHP /网络钓鱼方案中的SSL站点的DNS重定向或欺诈性本地证书的方法
    • US08429734B2
    • 2013-04-23
    • US11831843
    • 2007-07-31
    • Paul AgbabianWilliam E. SobelBruce McCorkendale
    • Paul AgbabianWilliam E. SobelBruce McCorkendale
    • G06F21/00
    • H04L63/1416H04L63/0823H04L63/166
    • Certificate information associated with a received certificate, such as a Secure Sockets Layer (SSL) certificate is stored in a trusted local cache and/or in one or more remote trusted sources, such as a single remote trusted source and/or a trusted peer network. When a site certificate is received on a host computer system, certificate information associated with the received site certificate is obtained and compared with the stored certificate information to determine whether or not the site certificate indicates malicious activity, such as a malicious DNS redirection or a fraudulent local certificate. When a site certificate is not found indicative of malicious activity, the site certificate is released. Alternatively, when a site certificates is found indicative of malicious activity protective action is taken. In some embodiments, a user's log-in credentials are automatically obtained from a trusted local cache and automatically submitted to a web site.
    • 与接收到的证书(例如安全套接字层(SSL))证书相关联的证书信息被存储在受信任的本地高速缓存和/或一个或多个远程可信源中,诸如单个远程可信源和/或可信对等网络 。 当在主机系统上接收到站点证书时,获得与接收到的站点证书相关联的证书信息,并将其与存储的证书信息进行比较,以确定站点证书是否指示恶意活动,例如恶意DNS重定向或欺诈 本地证书。 当找不到指示恶意活动的站点证书时,将发布站点证书。 或者,当发现指示恶意行为的现场证书时,采取保护措施。 在一些实施例中,从受信任的本地高速缓存自动地获得用户的登录凭证并自动提交给网站。
    • 5. 发明授权
    • Systems and methods for determining a file set
    • 用于确定文件集的系统和方法
    • US08706745B1
    • 2014-04-22
    • US12130839
    • 2008-05-30
    • Shaun CooleyWilliam E. SobelBruce McCorkendale
    • Shaun CooleyWilliam E. SobelBruce McCorkendale
    • G06F7/00G06F17/30
    • G06F21/564
    • A computer-implemented method for determining a file set may include identifying a file set and identifying a key file for the file set. The method may also include transmitting a key-file identifier to a second computing system. A first computing system may receive first and second file identifiers from a second computing system. The first computing system may determine whether the file set comprises a file identified by the first file identifier, and whether the file set comprises a file identified by the second file identifier. The method also includes transmitting a result of the determination to the second computing system. A method for determining a file set on a second computing device is also disclosed. Corresponding systems and computer-readable media are also disclosed.
    • 用于确定文件集的计算机实现的方法可以包括识别文件集并且识别文件集的密钥文件。 该方法还可以包括将密钥文件标识符发送到第二计算系统。 第一计算系统可以从第二计算系统接收第一和第二文件标识符。 第一计算系统可以确定文件集是否包括由第一文件标识符标识的文件,以及文件集是否包括由第二文件标识符标识的文件。 该方法还包括将确定的结果发送给第二计算系统。 还公开了一种用于确定在第二计算设备上的文件集的方法。 还公开了相应的系统和计算机可读介质。
    • 6. 发明授权
    • Enabling selective policy driven propagation of configuration elements between and among a host and a plurality of guests
    • 启用主机和多个客户端之间的配置元素的选择性策略驱动的传播
    • US08578006B2
    • 2013-11-05
    • US13074850
    • 2011-03-29
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • G06F15/173
    • G06F9/44505
    • Configuration elements are selectively propagated between a host and multiple guests, based on a policy. Configuration elements of the host and guests are monitored. Changes made to monitored configuration elements are detected. It is determined whether to propagate changed configuration elements between operating system environments based on the policy. It can be determined to propagate changed configuration element(s) from a source to one or more destinations in response to factors such as the identity and/or classification of the source, or the type, attribute(s), content and/or identity of the changed configuration element(s). The creation of new guests is detected. In response, at least one configuration element from at least one source is automatically propagated to a newly created guest.
    • 基于策略,配置元素在主机和多个客户端之间选择性地传播。 监控主机和客户端的配置元素。 检测到对受监视的配置元素进行的更改。 根据策略确定是否在操作系统环境之间传播已更改的配置元素。 响应于诸如源的身份和/或分类或类型,属性,内容和/或身份的因素,可以确定将更改的配置元素从源传播到一个或多个目的地 的更改的配置元素。 检测到新客人的创建。 作为响应,来自至少一个源的至少一个配置元素被自动传播到新创建的访客。
    • 7. 发明授权
    • Systems and methods for preventing exploitation of byte sequences that violate compiler-generated alignment
    • 防止使用违反编译器生成的对齐方式的字节序列的系统和方法
    • US08434073B1
    • 2013-04-30
    • US12263739
    • 2008-11-03
    • Sourabh SatishBruce McCorkendaleWilliam E. Sobel
    • Sourabh SatishBruce McCorkendaleWilliam E. Sobel
    • G06F9/44G06F9/45G06F9/445G06F12/00G06F12/14
    • G06F21/54
    • An exemplary method for preventing exploitation of byte sequences that violate compiler-generated instruction alignment may comprise: 1) identifying instantiation of a process, 2) identifying an address space associated with the process, 3) identifying, within the address space associated with the process, at least one control-transfer instruction, 4) determining that at least one byte preceding the control-transfer instruction is capable of resulting in an out-of-alignment instruction, and then 5) preventing the control-transfer instruction from being executed. In one example, the system may prevent the control-transfer instruction from being executed by inserting a hook in place of the intended instruction that executes the intended instruction and then returns control flow back to the instantiated process. Corresponding systems and computer-readable media are also disclosed.
    • 用于防止违反编译器生成的指令对准的字节序列的示例性方法可以包括:1)识别过程的实例化,2)识别与该过程相关联的地址空间,3)在与该过程相关联的地址空间内识别 ,至少一个控制传输指令,4)确定控制传输指令之前的至少一个字节能够导致不对齐指令,然后5)防止执行控制传输指令。 在一个示例中,系统可以通过插入钩来代替执行预期指令的预期指令来防止控制传输指令被执行,然后将控制流程返回到实例化的进程。 还公开了相应的系统和计算机可读介质。