会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Short-range mobile honeypot for sampling and tracking threats
    • 用于采样和跟踪威胁的短距离移动蜜罐
    • US08528080B2
    • 2013-09-03
    • US12560326
    • 2009-09-15
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • G06F11/00
    • H04L63/1425G06F21/56H04L63/145H04W12/12
    • Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.
    • 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。
    • 3. 发明申请
    • SHORT-RANGE MOBILE HONEYPOT FOR SAMPLING AND TRACKING THREATS
    • 短距离移动蜂蜜用于采样和跟踪威胁
    • US20130091570A1
    • 2013-04-11
    • US12560326
    • 2009-09-15
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • Bruce McCorkendaleJohn P. KellyBrian Hernacki
    • G06F11/00
    • H04L63/1425G06F21/56H04L63/145H04W12/12
    • Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server. The method can also include, responsive to a request from the security server for more information about one of the files, providing a copy of that file to the security server for malware analysis and for updating a reputation system tracking mobile device malware.
    • 移动设备收到的文件将进行采样,以进行恶意软件跟踪。 该方法包括在移动设备上配置使用短距离通信技术的文件传输机制,以显示其他设备,以接受所有传送文件的尝试。 该方法还包括从另一设备截取通过短程通信技术传送的文件到移动设备。 该方法还包括隔离传输到移动设备的文件,并记录关于隔离的每个文件的标识信息和关于每个文件源自的其他设备。 该方法还包括向接收到的安全服务器提供记录的识别信息。 该方法还可以包括响应于来自安全服务器的关于关于文件之一的更多信息的请求,将该文件的副本提供给安全服务器用于恶意软件分析和用于更新跟踪移动设备恶意软件的信誉系统。
    • 4. 发明授权
    • Parental policy based online wish lists
    • 基于父母政策的在线愿望清单
    • US08762229B1
    • 2014-06-24
    • US11959439
    • 2007-12-18
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • G06Q30/00
    • G06Q30/0633
    • A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children.
    • 强制执行家长政策进行网上购物。 父母输入父母政策,指示禁止孩子使用的项目。 当孩子尝试将项目添加到愿望清单中时,根据策略确定项目是否被允许。 如果是这样,则允许将项目添加到愿望清单中。 如果该政策禁止该项目,该项目添加到愿望清单将被阻止。 此外,父母可以通过(通过电子邮件,电话等)通知尝试将项目添加到愿望清单。 相同的逻辑可以应用于为儿童购买物品的尝试,或尝试购买儿童的物品。