会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Switch construction
    • 开关结构
    • US3952178A
    • 1976-04-20
    • US561684
    • 1975-03-25
    • Cleve Lloyd ReeseJohn P. Kelly
    • Cleve Lloyd ReeseJohn P. Kelly
    • H01H9/02
    • H01H9/02
    • A limit switch construction is provided in which a first component is affixed to a first section of a housing and a second component is affixed to a second section of the housing. When the two sections of the housing are assembled, the components electrically engage one another and are encompassed by the housing. The first component includes a pair of stationary contact means and a third contact means selectively movable into electrical contact with either of said stationary contact means. The second component is provided with a plurality of terminals which are electrically connected to corresponding contact means of the first component when the housing sections are assembled. The contact means and terminals are located adjacent one of the side walls of the first and the second sections and the second housing section is provided with an elongated pocket for accommodating portions of the electrical leads extending into the housing and connected to the terminals.
    • 提供限位开关结构,其中第一部件固定在壳体的第一部分上,而第二部件固定到壳体的第二部分。 当壳体的两个部分组装时,部件彼此电耦合并被壳体包围。 第一部件包括一对固定接触装置和选择性地可移动地与任一个所述固定接触装置电接触的第三接触装置。 第二部件设置有多个端子,当壳体部分组装时,该端子电连接到第一部件的对应接触装置。 接触装置和端子位于第一和第二部分的一个侧壁附近,并且第二壳体部分设置有细长的凹部,用于容纳延伸到壳体中并连接到端子的电引线的部分。
    • 7. 发明授权
    • Short-range mobile honeypot for sampling and tracking threats
    • 用于采样和跟踪威胁的短距离移动蜜罐
    • US08528080B2
    • 2013-09-03
    • US12560326
    • 2009-09-15
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • G06F11/00
    • H04L63/1425G06F21/56H04L63/145H04W12/12
    • Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.
    • 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。
    • 8. 发明申请
    • SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS
    • 短距离移动蜂蜜用于采样和跟踪威胁
    • US20130091570A1
    • 2013-04-11
    • US12560326
    • 2009-09-15
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • G06F11/00
    • H04L63/1425G06F21/56H04L63/145H04W12/12
    • Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.
    • 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。