会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明申请
    • SYSTEMS AND METHODS OF DETECTING AND RESPONDING TO A MALWARE ON A FILE SYSTEM
    • 在文件系统上检测和回应恶意软件的系统和方法
    • WO2018031778A1
    • 2018-02-15
    • PCT/US2017/046301
    • 2017-08-10
    • NETSKOPE, INC.
    • HITTEL, SeanNARAYANASWAMY, KrishnaBALUPARI, Ravindra K.ITHAL, Ravi
    • G06F21/55G06F21/56
    • The technology disclosed relates to detecting a data attack on a file system stored on an independent data store. The detecting includes scanning a list to identify files of the independent data store that have been updated within a timeframe, assembling current metadata for files identified by the scanning, obtaining historical metadata of the files, determining that a malicious activity is in process by analyzing the current metadata of the files and the historical metadata to identify a pattern of changes that exceeds a predetermined change velocity. Further, the detecting includes determining that the malicious activity is in process by analyzing the current metadata of the files and known patterns of malicious metadata to identify a match between the current metadata and the known patterns of malicious metadata, determining a entity that initiated the malicious activity, and implementing a response mechanism that restricts file modifications by the determined entity.
    • 所公开的技术涉及检测存储在独立数据存储器上的文件系统上的数据攻击。 所述检测包括扫描列表以识别已经在时间范围内更新的独立数据存储的文件,组装由扫描识别的文件的当前元数据,获得文件的历史元数据,通过分析所述文件的历史元数据来确定恶意活动正在进行中 文件的当前元数据和历史元数据,以识别超过预定变化速度的变化模式。 此外,检测包括通过分析文件的当前元数据和已知的恶意元数据模式来确定恶意活动正在进行中,以识别当前元数据与已知恶意元数据模式之间的匹配,确定发起恶意的实体 活动,并实施一个响应机制,限制所确定的实体进行文件修改。
    • 5. 发明申请
    • SECURITY FOR NETWORK DELIVERED SERVICES
    • 网络提供服务的安全
    • WO2014138388A3
    • 2014-11-06
    • PCT/US2014021174
    • 2014-03-06
    • NETSKOPE INC
    • NARAYANASWAMY KRISHNACHENG LEBINITHAL RAVIBERI SANJAY
    • G06F15/16
    • H04L63/20H04L63/0272H04L63/0281H04L63/08H04L63/1425H04L63/168H04L67/20
    • A computer-implemented method for accessing a hosted service on client devices is described. The client devices include client software that uses a remotely delivered policy to redirect network requests for hosted services to a server to enforce visibility, policy and data security for network delivered services. The method can be used in conjunction with existing VPN and proxy solutions, but provides distinct additional functionality, particularly suited to corporate needs. Policies allow entities to centralize enforcement of service-specific restrictions across networks and communication channels, e.g. only certain users can download client records from a service— irrespective of the network used to access the service.
    • 描述了用于访问客户端设备上的托管服务的计算机实现的方法。 客户端设备包括使用远程传递的策略的客户端软件,将托管服务的网络请求重定向到服务器,以实现对网络传送服务的可见性,策略和数据安全性。 该方法可以与现有的VPN和代理解决方案结合使用,但提供了独特的附加功能,特别适合企业需求。 政策允许实体集中执行网络和通信渠道之间的服务特定限制,例如 只有某些用户可以从服务下载客户端记录,而不管用于访问服务的网络如何。