会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method and system for creating enriched log data
    • 用于创建丰富的日志数据的方法和系统
    • US09501345B1
    • 2016-11-22
    • US14139449
    • 2013-12-23
    • Intuit Inc.
    • M. Shannon LietzLuis Felipe Cabrera
    • G06F11/00G06F11/07G06F11/30
    • G06F11/0784G06F11/0709G06F11/079G06F11/301G06F17/30G06F17/40
    • Access to first log data from a first log data source and second log data from a second log data source is obtained. Trigger event log data is defined and the second log data from the second log data source is monitored to detect the defined trigger event log data in the second log data. If the defined trigger event log data is detected in the second log data from the second log data source, the detected trigger event log data in the second log data from the second log data source is correlated with the first log data from the first log data source, and/or at least part of the second log data from the second log data source is inserted into the first log data from the first log data source.
    • 获得来自第一个日志数据源的第一个日志数据和来自第二个日志数据源的第二个日志数据。 定义触发事件日志数据,并监视来自第二个日志数据源的第二个日志数据,以检测第二个日志数据中定义的触发事件日志数据。 如果在来自第二日志数据源的第二日志数据中检测到定义的触发事件日志数据,则来自第二日志数据源的第二日志数据中检测到的触发事件日志数据与来自第一日志数据的第一日志数据相关 源和/或来自第二日志数据源的第二日志数据的至少一部分从第一日志数据源插入到第一日志数据中。
    • 8. 发明申请
    • METHOD AND APPARATUS FOR AUTOMATING THREAT MODEL GENERATION AND PATTERN IDENTIFICATION
    • 自动化模型生成和模式识别的方法和装置
    • US20160248798A1
    • 2016-08-25
    • US15086330
    • 2016-03-31
    • Intuit Inc.
    • Luis Felipe CabreraM. Shannon LietzJavier Godinez
    • H04L29/06
    • H04L63/1433G06F21/577H04L63/1425
    • A method and system for automating threat model generation and pattern identification for an application includes identifying components of an application, and receiving security information that identifies whether security measures were implemented within the application to secure the application against security threats. The method further receives an identification of external events, and receiving first patterns from one or more first virtual assets. A database is populated with the first patterns and the external events and then second patterns are received and compared to the first patterns. The method and system include distributing the identification of the one of the external events to the one or more second virtual assets, if the second patterns are similar to the first patterns, according to one embodiment.
    • 用于自动化应用的威胁模型生成和模式识别的方法和系统包括识别应用的组件,以及接收安全信息,该安全信息标识在应用程序内是否实施安全措施以保护应用免受安全威胁。 该方法还接收外部事件的标识,以及从一个或多个第一虚拟资产接收第一模式。 数据库填充有第一模式和外部事件,然后接收第二模式并与第一模式进行比较。 根据一个实施例,如果第二图案类似于第一图案,则该方法和系统包括将外部事件之一的识别分配给一个或多个第二虚拟资产。