会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • AUTOMATIC SANITIZATION OF DATA ON A MOBILE DEVICE IN A NETWORK ENVIRONMENT
    • 网络环境下移动设备上的数据自动消毒
    • WO2014105307A1
    • 2014-07-03
    • PCT/US2013/071305
    • 2013-11-21
    • MCAFEE INC.HUNT, SimonROBISON, Brian T.
    • HUNT, SimonROBISON, Brian T.
    • H04W12/08H04W12/06
    • H04W12/08G06F21/62G06F2221/2137G06F2221/2143H04L63/108H04L63/20
    • A method is provided in one example embodiment and includes establishing a network connection to a central security system in a central network, receiving a message from the central security system, activating a grace window based on the message, and determining whether the grace window has expired. The method further includes deleting, when the grace window expires, one or more objects from the mobile device based on a sanitization policy. In specific embodiments, the network connection is terminated before the grace window expires, and the grace window expires unless the mobile device establishes another network connection with the central security system. In further embodiments, the method includes receiving the sanitization policy from the central security system. The sanitization policy identifies the one or more objects to be deleted from the mobile device when the grace window expires.
    • 在一个示例实施例中提供了一种方法,并且包括建立到中央网络中的中央安全系统的网络连接,从中央安全系统接收消息,基于该消息激活宽限期窗口,以及确定宽限期窗口是否已经过期 。 该方法还包括当宽限期窗口到期时,基于消毒策略从移动设备中删除一个或多个对象。 在具体实施例中,网络连接在宽限期窗口到期之前终止,宽限期窗口到期,除非移动设备与中央安全系统建立另一网络连接。 在另外的实施例中,该方法包括从中央安全系统接收卫生策略。 当宽限期窗口到期时,消毒策略标识要从移动设备中删除的一个或多个对象。
    • 3. 发明申请
    • VIDEO AND GRAPHICS DISTRIBUTION SYSTEM FOR MOBILE USERS
    • 移动用户的视频和图形分发系统
    • WO0177800A3
    • 2002-03-14
    • PCT/GB0101591
    • 2001-04-06
    • MEDIA LOGIC SYSTEMS LTDHUNT SIMON
    • HUNT SIMON
    • G06F13/00H04L29/06H04L29/08H04M11/08H04N7/14H04N7/173H04Q7/22H04N7/24
    • H04L65/605H04L29/06027H04L67/04H04L67/10H04L69/329H04N7/142
    • A distribution system that can push computer-generated information to a mobile/peripatetic device (6) interspersed with a stream of live video and audio communications. The system provides distribution means (4) for use with mobile telecommunications networks (5) wherein the user perceives the video streaming process to be in real time, and a mechanism switches the display to graphics/text when it is necessary to buffer the incoming video stream or when congestion or delays arise due to a network event. The system includes a plurality of transcoders (2) for the conversion of data/graphics from external information sources (17) into a display format suitable for display on a mobile receiving device and pushes the information from a central workstation to the mobile receiving device. The video and audio data are provided by a live video/audio stream source (3). The system includes a distribution switch (4) enabling control of the display on the mobile receiving device through a message protocol.
    • 一种可将计算机生成的信息推送到移动/周边设备(6)的分发系统,其中散布着实时视频和音频通信流。 该系统提供与移动电信网络(5)一起使用的分发装置(4),其中用户感知视频流处理是实时的,并且当需要缓冲输入视频时,机构将显示切换到图形/文本 流或由于网络事件而出现拥塞或延迟时。 该系统包括用于将数据/图形从外部信息源(17)转换成适合于在移动接收设备上显示的显示格式并将信息从中央工作站推送到移动接收设备的多个代码转换器(2)。 视频和音频数据由实时视频/音频流源(3)提供。 该系统包括能够通过消息协议控制移动接收设备上的显示的分发交换机(4)。
    • 5. 发明申请
    • EFFICIENT VIRTUAL MACHINE DEPLOYMENT METHODOLOGY
    • 有效的虚拟机部署方法
    • WO2014059156A9
    • 2014-06-19
    • PCT/US2013064357
    • 2013-10-10
    • INTEL CORPHUNT SIMON
    • HUNT SIMON
    • G06F21/55G06F9/44G06F15/16
    • G06F8/63G06F8/61
    • A method for distribution of a shared image includes determining a plurality of elements of an image of a software installation, determining a plurality of contents of a client, performing a first hash operation on the plurality of elements of the image, performing the first hash operation on the plurality of contents of the client, comparing results of the first hash operation on the plurality of elements of the image with the results of the first hash operation on the plurality of contents of the client, determining that one or more of the plurality of elements of the image are unavailable on the client based on the comparison of the results of the first hash operation on the plurality of elements of the image with the results of the first hash operation on the plurality of contents of the client, and causing the selective transmission of the elements.
    • 用于分发共享图像的方法包括确定软件安装的图像的多个元素,确定客户端的多个内容,对图像的多个元素执行第一散列操作,执行第一散列操作 在客户端的多个内容上,将图像的多个元素上的第一散列操作的结果与第一散列操作的结果相比较,以确定多个 基于图像的多个元素上的第一散列操作的结果与第一散列操作对客户端的多个内容的结果的比较,图像的元素在客户端上不可用,并且使得选择 元素的传输。
    • 6. 发明申请
    • EFFICIENT VIRTUAL MACHINE DEPLOYMENT METHODOLOGY
    • 有效的虚拟机部署方法
    • WO2014059156A1
    • 2014-04-17
    • PCT/US2013/064357
    • 2013-10-10
    • INTEL CORPORATIONHUNT, Simon
    • HUNT, Simon
    • G06F21/55G06F15/16G06F9/44
    • G06F8/63G06F8/61
    • A method for distribution of a shared image includes determining a plurality of elements of an image of a software installation, determining a plurality of contents of a client, performing a first hash operation on the plurality of elements of the image, performing the first hash operation on the plurality of contents of the client, comparing results of the first hash operation on the plurality of elements of the image with the results of the first hash operation on the plurality of contents of the client, determining that one or more of the plurality of elements of the image are unavailable on the client based on the comparison of the results of the first hash operation on the plurality of elements of the image with the results of the first hash operation on the plurality of contents of the client, and causing the selective transmission of the elements.
    • 用于分发共享图像的方法包括确定软件安装的图像的多个元素,确定客户端的多个内容,对图像的多个元素执行第一散列操作,执行第一散列操作 在客户端的多个内容上,将关于图像的多个元素的第一散列操作的结果与对客户端的多个内容的第一散列操作的结果进行比较,确定多个 基于对图像的多个元素的第一散列操作的结果与对客户端的多个内容的第一散列操作的结果进行比较,并且使选择性的图像的元素在客户端上不可用 传输元素。
    • 10. 发明申请
    • HERD BASED SCAN AVOIDANCE SYSTEM IN A NETWORK ENVIRONMENT
    • 基于网络环境的基于扫描的扫描系统
    • WO2014105308A1
    • 2014-07-03
    • PCT/US2013/071327
    • 2013-11-21
    • MCAFEE, INC.RAMANAN, VenkataHUNT, Simon
    • RAMANAN, VenkataHUNT, Simon
    • G06F21/00G06F15/16
    • H04L67/2842G06F21/56G06F21/567G06F2221/2115H04L63/145H04L67/1095
    • A method in one example embodiment includes generating a signature for an object in a compute node in a network, searching a memory element for the signature, and responsive to determining the memory element does not contain the signature, scanning the object. The method also includes updating the memory element with a scan result, and synchronizing the memory element of the compute node with one or more memory elements of one or more other compute nodes in the network. In specific embodiments, the scan result includes the signature of the object and a threat level of the object. In further embodiments, the synchronizing includes sending the scan result to one or more other compute nodes in the network. In more specific embodiments, the scan result is sent with one or more other scan results after a predetermined interval of time from a previous synchronization.
    • 一个示例实施例中的方法包括为网络中的计算节点中的对象生成签名,在存储元件中搜索签名,并且响应于确定存储器元素不包含签名,扫描对象。 该方法还包括用扫描结果来更新存储元件,以及使计算节点的存储元件与网络中一个或多个其他计算节点的一个或多个存储元件同步。 在具体实施例中,扫描结果包括对象的签名和对象的威胁级别。 在另外的实施例中,同步包括将扫描结果发送到网络中的一个或多个其他计算节点。 在更具体的实施例中,在从先前同步起的预定时间间隔之后,用一个或多个其他扫描结果发送扫描结果。