会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Short-range mobile honeypot for sampling and tracking threats
    • 用于采样和跟踪威胁的短距离移动蜜罐
    • US08528080B2
    • 2013-09-03
    • US12560326
    • 2009-09-15
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • G06F11/00
    • H04L63/1425G06F21/56H04L63/145H04W12/12
    • Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.
    • 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。
    • 3. 发明申请
    • SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS
    • 短距离移动蜂蜜用于采样和跟踪威胁
    • US20130091570A1
    • 2013-04-11
    • US12560326
    • 2009-09-15
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • G06F11/00
    • H04L63/1425G06F21/56H04L63/145H04W12/12
    • Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.
    • 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。
    • 5. 发明授权
    • Parental policy based online wish lists
    • 基于父母政策的在线愿望清单
    • US08762229B1
    • 2014-06-24
    • US11959439
    • 2007-12-18
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • G06Q30/00
    • G06Q30/0633
    • A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children.
    • 强制执行家长政策进行网上购物。 父母输入父母政策,指示禁止孩子使用的项目。 当孩子尝试将项目添加到愿望清单中时,根据策略确定项目是否被允许。 如果是这样,则允许将项目添加到愿望清单中。 如果该政策禁止该项目,该项目添加到愿望清单将被阻止。 此外,父母可以通过(通过电子邮件,电话等)通知尝试将项目添加到愿望清单。 相同的逻辑可以应用于为儿童购买物品的尝试,或尝试购买儿童的物品。
    • 8. 发明授权
    • Embedded object binding and validation
    • 嵌入式对象的绑定和验证
    • US09077748B1
    • 2015-07-07
    • US12141022
    • 2008-06-17
    • Brian HernackiWilliam E. Sobel
    • Brian HernackiWilliam E. Sobel
    • G06F11/00H04L29/06G06F21/56
    • H04L63/1483G06F21/562G06F21/565G06F21/566H04L63/1433
    • Unauthorized uses of embedded objects in websites are detected, in order to protect users from phishing sites using cloned copies of such objects. Authorized parties register objects for use at legitimate locations (e.g., specific IP address ranges or domains). When a client computing device accesses a website, the objects in the website are checked against the registered objects, to determine whether the objects are registered for use by the site being accessed. Depending upon trust status information concerning the objects, the access of the website can be permitted or blocked, or the user can be warned about questionable or un-trusted embedded objects. Additionally, the party that registered an object can be notified, in the case of an indication of unauthorized use of the object by a website.
    • 检测到未经授权的网站中嵌入对象的使用,以便使用克隆的这些对象副本来保护用户免受网络钓鱼站点的攻击。 授权方注册在合法位置使用的对象(例如,特定的IP地址范围或域)。 当客户端计算设备访问网站时,将根据注册对象检查网站中的对象,以确定对象是否被所访问的站点注册使用。 根据有关对象的信任状态信息,可以允许或阻止网站的访问,或者可以对可疑或不可信的嵌入对象进行警告。 此外,在通过网站指示未经许可使用对象的情况下,可以通知注册对象的一方。
    • 10. 发明授权
    • Profiling application usage from application streaming
    • 从应用程序流分析应用程序的使用情况
    • US08977764B1
    • 2015-03-10
    • US12039515
    • 2008-02-28
    • Zulfikar RamzanSourabh SatishBrian Hernacki
    • Zulfikar RamzanSourabh SatishBrian Hernacki
    • G06F15/16
    • G06F11/3466G06F9/44521G06F11/3409G06F2201/865
    • Application usage is profiled based on application streaming. Code pages of multiple applications are streamed from a server to multiple client computers (endpoints) for execution. The streaming of the code pages is monitored, and usage data is collected such as which pages are streamed to which endpoints, under what circumstances and when. By referencing the streamed code pages and the underlying source code, the code pages are mapped (at least approximately) to corresponding application features. The collected usage data usage and the relevant mapping are analyzed, to create application usage profile data for streamed applications. The application usage profile data can include such information as how often, when, where and by whom application components are being executed, as well as which components cause errors, are most popular, confuse users, etc.
    • 应用程序使用情况基于应用程序流式进行分析。 多个应用程序的代码页从服务器流式传输到多个客户端计算机(端点)以供执行。 监视代码页的流式传输,并收集使用数据,例如哪些页面被流式传输到哪个端点,在什么情况下和什么时候。 通过引用流传输的代码页和底层的源代码,代码页被映射(至少近似)到相应的应用程序特征。 分析收集的使用数据用法和相关映射,以创建流应用程序的应用程序使用情况数据。 应用程序使用情况数据可以包括诸如应用组件的执行频率,何时何地以及由哪个应用组件执行的信息以及哪些组件导致错误,最受欢迎的,混淆用户等的信息。