会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • Detecting and countering malicious code in enterprise networks
    • 检测和打击企业网络中的恶意代码
    • US20030200464A1
    • 2003-10-23
    • US10414117
    • 2003-04-15
    • Computer Associates Think, Inc.
    • Yaron Kidron
    • G06F011/30G06F015/173
    • H04L63/0218H04L63/145
    • A system and method for detecting and countering malicious code in an enterprise network are provided. A pattern recognition processor monitors local operations on a plurality of local machines connected through an enterprise network, to detect irregular local behavior patterns. An alert may be generated after an irregularity in behavior pattern on a local machine is detected. Irregular behavior alerts from a plurality of local machines are analyzed. If similar alerts are received from at least a threshold number of local machines over a corresponding period of time, one or more countermeasure operations are selected based on the analysis of the irregular behavior alerts. The selected countermeasure operations are communicated to the local machines and performed by the local machines.
    • 提供了一种用于在企业网络中检测和对抗恶意代码的系统和方法。 模式识别处理器监视通过企业网络连接的多个本地机器上的本地操作,以检测不规则的局部行为模式。 在检测到本地机器上的行为模式不规则之后,可能会产生警报。 分析来自多个本地机器的不规则行为警报。 如果在相应时间段内从至少阈值数量的本地机器接收到相似的警报,则基于对不规则行为警报的分析来选择一个或多个对策操作。 所选择的对策操作被传送到本地机器并由本地机器执行。
    • 7. 发明申请
    • Directory services system and methods with mapping in database tables
    • 目录服务系统和数据库表映射方法
    • US20030191759A1
    • 2003-10-09
    • US10300885
    • 2002-11-21
    • COMPUTER ASSOCIATES THINK, INC.
    • Richard Hans Harvey
    • G06F017/30
    • G06F17/30595G06F17/30604G06F17/30607H04L29/12075H04L29/12084H04L29/12132H04L61/1517H04L61/1523H04L61/1552Y10S707/99931Y10S707/99933Y10S707/99934Y10S707/99942Y10S707/99954
    • A method and apparatus for addressing problems associated with the implementation of directory services, such as X.500 and LDAP, in a SQL environment, particularly problems associated with interrogating database provided to implement directory services in the SQL environment. According to the disclosed method and apparatus, the system is based on the use of tables that may be arranged to have a plurality of columns, so that they support a variety of functions in order to implement directory services, such as X.500 and LDAP. In one aspect, the present invention provides a method of creating one or more SQL commands corresponding to a directory service. In another aspect, the present invention provides a many examples of tables and their function. Many examples of an implementation of directory services using SQL based technology are disclosed. This application is a divisional of U.S. Ser. No. 08/793,575, which is currently pending and which is incorporated herein by reference in its entirety.
    • 在SQL环境中解决与执行目录服务(例如X.500和LDAP)相关的问题的方法和装置,特别是与询问数据库有关的问题,该数据库是为了在SQL环境中实现目录服务而提供的。 根据所公开的方法和装置,该系统基于可以被布置为具有多个列的表的使用,使得它们支持各种功能以实现目录服务,诸如X.500和LDAP 。 一方面,本发明提供了一种创建与目录服务相对应的一个或多个SQL命令的方法。 另一方面,本发明提供了许多表格及其功能的例子。 公开了使用基于SQL的技术实现目录服务的许多示例。 这个应用程序是美国系统的一个部门。 目前正在等待并且其全部内容通过引用并入本文的No.08 / 793,575。
    • 8. 发明申请
    • System and method for specifying elliptical parameters
    • 用于指定椭圆参数的系统和方法
    • US20030156123A1
    • 2003-08-21
    • US10367077
    • 2003-02-14
    • Computer Associates Think, Inc.
    • Arnold F. Steed
    • G09G005/00
    • G06T11/203
    • An interactive elliptical arc control system and method are disclosed. Three control points are providednulla center control point and two foci control pointsnullthat a user can interactively manipulate in order to specify and change the elliptical parameters involved. The center control point can control the radius of the ellipse in the x direction, while keeping constant the ratio of the radius of the ellipse in the y direction to the radius of the ellipse in the x direction. The center control point can also control the relationship of the sweep flag to the large arc flag involved. The two foci control points can control the ratio of the radius of the ellipse in the y direction to the radius of the ellipse in the x direction, the angle from the x-axis of the coordinate system to the x-axis of the ellipse, and the value of the sweep flag.
    • 公开了一种交互式椭圆弧控制系统和方法。 提供三个控制点 - 一个中心控制点和两个焦点控制点,用户可以通过交互操作来指定和更改所涉及的椭圆参数。 中心控制点可以在x方向上控制椭圆的半径,同时保持椭圆在y方向上的半径与x方向上的椭圆半径的比值。 中心控制点也可以控制扫描标志与所涉及的大弧标志的关系。 两个焦点控制点可以控制椭圆在y方向上的半径与x方向上的椭圆半径的比值,即从坐标系的x轴到椭圆的x轴的角度, 和扫描标志的值。
    • 9. 发明申请
    • OTP GENERATION USING A CAMOUFLAGED KEY
    • OTP生成使用一个凸字键
    • US20140040629A1
    • 2014-02-06
    • US14053097
    • 2013-10-14
    • Computer Associates Think, Inc.
    • Geoffrey R. HirdRammohan Varadarajan
    • H04L29/06
    • H04L63/0838G06F21/34H04L9/0863H04L9/3228
    • A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.
    • 提供了一种用于从用户设备生成一次性密码(OTP)的系统和方法。 该方法包括向用户设备提供由提供者帐户定义的密码应用程序和卡片串。 密码应用程序被配置为使用卡片字符串生成配置为提供商帐户的用户OTP的密码。 卡片由至少一个伪装有个人识别号码(PIN)的钥匙定义。 该密钥可能通过修改和加密PIN下的修改密钥来伪装。 密钥可以被配置为对称密钥,秘密,种子和受控的数据。 卡片可能是EMV卡片串; 并且密钥可以是UDKA或UDKB。 卡片可以是OTP卡片,并且密钥可以是可配置的密钥,以生成HOTP,TOTP和基于计数器的OTP之一。