会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Dynamically obfuscated javascript
    • 动态混淆的javascript
    • US08683452B1
    • 2014-03-25
    • US12974756
    • 2010-12-21
    • Roy HodgmanOfer MizrachOfri MannAlex Vaystikh
    • Roy HodgmanOfer MizrachOfri MannAlex Vaystikh
    • G06F9/44G06F9/45G06F12/14
    • G06F8/51
    • An improved technique of providing computer code to a set of client computers is disclosed. In the improved technique, a set of files is generated, each file in the set of files including computer code configured to be read by an interpreter on each client computer, the computer code in each file including a set of functions, each function in the set of functions having a name, the name of a function in the set of functions in a first file in the set of files differing from the name of a corresponding function in the set of functions in a second file in the set of files, the computer code in the first file and the computer code in the second file being constructed and arranged to produce functionally equivalent sets of computer instructions when run through the interpreter on each client computer.
    • 公开了一种向一组客户端计算机提供计算机代码的改进技术。 在改进的技术中,生成一组文件,文件集中的每个文件包括配置为由每个客户端计算机上的解释器读取的计算机代码,每个文件中的计算机代码包括一组功能,每个功能在 一组具有名称的功能的名称,该组文件中的第一个文件中的功能集中的功能的名称与文件集中的第二个文件中的功能集中的相应功能的名称不同, 第一文件中的计算机代码和第二文件中的计算机代码被构造和布置成在每个客户端计算机上通过解释器运行时产生功能上相同的计算机指令集。
    • 2. 发明授权
    • Detection of fast flux networks
    • 快速通量网络的检测
    • US08904524B1
    • 2014-12-02
    • US13245926
    • 2011-09-27
    • Roy Hodgman
    • Roy Hodgman
    • G06F12/14
    • G06F21/56G06F21/552
    • Improved techniques of identifying a malicious communication involve a lightweight evaluator obtaining a domain name directly from a network transmission. The lightweight evaluator performs a query of the domain name on a database of known network transactions. Results of the query include IP addresses to which the domain name has resolved in prior transactions and Time To Live (TTL) values for each of those IP addresses. To such results of the query, the lightweight evaluator applies a set of heuristics which are arranged to determine whether the domain name could plausibly be a FFDN. Based on the result of the application of the heuristics to the domain name, the lightweight evaluator sends to a backend evaluator the domain name and a command to confirm whether the domain name is a FFDN.
    • 改进的识别恶意通信的技术涉及轻量级评估者直接从网络传输获取域名。 轻量级评估器对已知网络事务的数据库执行域名查询。 查询的结果包括域名在先前交易中解析的IP地址以及每个IP地址的“生存时间”(TTL)值。 对于查询的这种结果,轻量级评估器应用一组启发式算法,其被设置为确定域名是否可能是FFDN。 基于将启发式应用于域名的结果,轻量级评估器向后端评估者发送域名和一个命令,以确认域名是否为FFDN。
    • 3. 发明授权
    • Techniques for multiple independent verifications for digital certificates
    • 用于数字证书的多个独立验证的技术
    • US09021255B1
    • 2015-04-28
    • US13537904
    • 2012-06-29
    • Idan AharoniRoy HodgmanIngo Schubert
    • Idan AharoniRoy HodgmanIngo Schubert
    • H04L29/06G06F21/33
    • H04L29/06G06F21/33H04L9/3268H04L63/0823H04L63/126H04L63/1483H04L63/168H04L67/02
    • A method includes (a) receiving, at a computing device, a first certificate signing request (1CSR) from a certificate authority (CA), the 1CSR including an embedded second certificate signing request (2CSR), the 2CSR having been received by the CA from an entity seeking a signed certificate from the CA that validates an identity claim made by the entity in the 2CSR, the CA having performed a preliminary verification of the 2CSR prior to embedding it in the 1CSR, (b) verifying that the 1CSR came from the CA, (c) performing a verification procedure on the embedded 2CSR independent of the preliminary verification performed by the CA, to validate the identity claim made by the entity in the 2CSR, and (d) upon successfully validating the identity claim made by the entity in the 2CSR, sending a certificate to the CA, the certificate validating the identity claim made by the entity in the 2CSR.
    • 一种方法包括(a)在计算设备处从证书颁发机构(CA)接收第一证书签名请求(1CSR),所述1CSR包括嵌入的第二证书签名请求(2CSR),所述2CSR已被CA接收 来自CA的实体从CA获得签发的证书,验证该实体在2CSR中作出的身份声明,CA在将其嵌入到1CSR之前对2CSR进行了初步验证,(b)验证了1CSR来自 CA,(c)独立于CA进行的初步验证,对嵌入式2CSR执行验证程序,以验证该实体在2CSR中提出的身份声明,以及(d)成功验证由 2CSR中的实体,向CA颁发证书,证明该实体在2CSR中提出的身份证明。
    • 4. 发明授权
    • Distributed anonymized communications
    • 分布式匿名通信
    • US09015231B1
    • 2015-04-21
    • US13431231
    • 2012-03-27
    • Roy HodgmanMarten Erik van DijkEyal Kolman
    • Roy HodgmanMarten Erik van DijkEyal Kolman
    • G06F15/16H04W12/08H04W12/02
    • H04W12/08H04W12/02
    • A server is configured to communicate with a group of clients over a network. Each of the clients obtains a corresponding informational message comprising security-related information such as an indication of compromise (IOC), inserts noise in the information message to generate an anonymized message, and communicates the anonymized message to the server. The anonymized messages communicated by the respective clients to the server may be configured so as to prevent the server from identifying any individual client associated with a particular one of the anonymized messages, while also allowing the server to extract from the anonymized messages collectively one or more characteristics of the underlying informational messages. A given client may insert noise in an informational message by, for example, selecting a noise value from a specified range of noise values, and combining the informational message and the selected noise value to generate the anonymized message.
    • 服务器被配置为通过网络与一组客户端进行通信。 每个客户端获得包括诸如妥协指示(IOC)之类的安全相关信息的相应信息性消息,在信息消息中插入噪声以生成匿名消息,并将匿名消息传送到服务器。 可以将由相应客户端传送到服务器的匿名消息配置成防止服务器识别与特定一个匿名消息相关联的任何个人客户端,同时还允许服务器从匿名消息中抽出一个或多个 底层信息消息的特征。 给定的客户端可以通过例如从指定的噪声值范围中选择噪声值并将信息消息和所选择的噪声值组合以生成匿名消息来在信息消息中插入噪声。
    • 5. 发明授权
    • Robust message encryption
    • 强大的邮件加密
    • US08924726B1
    • 2014-12-30
    • US13170242
    • 2011-06-28
    • Roy HodgmanDaniel Hassan
    • Roy HodgmanDaniel Hassan
    • H04L9/32
    • G09C5/00H04L9/30H04L9/3247
    • An improved technique involves generating an encoded representation of encrypted forms of a message which includes an institution's digital signature derived from the message. The institution sends the encoded representation to the user's computer. The user transfers an image of the encoded representation from the user's computer to a separate hand-held device. The user then derives the encrypted forms of the message and the institution's digital signature by decoding the image on the hand-held device; the user then decrypts the encrypted forms of the message and the institution's digital signature on the hand-held device. The user then sees the message without interference from an intrusive agent in a MitB attack. Further, the user can verify the institution's identity as the sender of the message by being able to validate the institution's digital signature. In this way, a MitB attack is very likely to be made apparent to the user.
    • 改进的技术涉及生成包括从该消息导出的机构的数字签名的消息的加密形式的编码表示。 机构将编码表示发送给用户的计算机。 用户将编码表示的图像从用户计算机传送到单独的手持设备。 然后,用户通过解码手持设备上的图像来导出消息的加密形式和机构的数字签名; 用户然后在手持设备上解密消息的加密形式和机构的数字签名。 然后,用户在MitB攻击中会看到该消息而不受入侵代理的干扰。 此外,用户可以通过能够验证机构的数字签名来验证机构的身份作为消息的发送者。 这样一来,MitB攻击很有可能对用户来说是显而易见的。
    • 7. 发明授权
    • Identifying malware sources using phishing kit templates
    • 使用网络钓鱼套件模板识别恶意软件源
    • US08910281B1
    • 2014-12-09
    • US13537251
    • 2012-06-29
    • Idan AharoniRoy Hodgman
    • Idan AharoniRoy Hodgman
    • H04L29/06
    • H04L63/1416H04L63/1483
    • An improved technique involves searching for emails having a particular template generated by a phishing kit. Such a template typically includes field names corresponding to credentials that a customer inputs into a spoofed web site as part of a phishing attack. The phishing kit used in a phishing attack is typically configured to construct an email so that it arranges the credentials in a regular, tabular fashion. Accordingly, an administrator configures a receiver to search an email server for emails having a sequence of keywords in a format that matches the particular template.
    • 一种改进的技术涉及搜索具有由网络钓鱼套件生成的特定模板的电子邮件。 这样的模板通常包括对应于客户作为网络钓鱼攻击的一部分输入到欺骗性网站的凭证的字段名称。 用于网络钓鱼攻击的网络钓鱼套件通常配置为构建电子邮件,以便以正常的表格方式排列凭据。 因此,管理员配置接收器以搜索电子邮件服务器以具有与特定模板匹配的格式的具有一系列关键字的电子邮件。
    • 8. 发明授权
    • Controlling access to a computerized resource based on authentication using pulse data
    • 基于使用脉冲数据的认证来控制对计算机资源的访问
    • US08902045B1
    • 2014-12-02
    • US13336573
    • 2011-12-23
    • John LinnWilliam M. DuaneYedidya DotanRoy Hodgman
    • John LinnWilliam M. DuaneYedidya DotanRoy Hodgman
    • G08B21/00
    • G06F21/32A61B5/0077A61B5/024A61B5/0452A61B5/117A61B5/7264G06K9/00288G06K9/00617G06K9/00892G06K2009/00322G06K2009/00939H04L63/0861H04W12/06
    • A technique performs an authentication operation using pulse and facial data from a user. The technique involves obtaining current pulse data from a user, and performing a comparison between the current pulse data from the user and expected pulse data for the user. The technique further involves generating an authentication result based on the comparison between the current pulse data and the expected pulse data. The authentication result may control user access to a computerized resource. Since such a technique uses pulse data, a perpetrator cannot simply submit a static image of a subject's face to circumvent the authentication process. In some arrangements, the technique involves obtaining videos of human faces and deriving cardiac pulse rates from the videos. For such arrangements, a standard webcam can be used to capture the videos. Moreover, such techniques are capable of factoring in circadian rhythms and/or aging adjustments to detect and thwart video replay attacks.
    • 一种技术使用来自用户的脉冲和面部数据进行认证操作。 该技术涉及从用户获取当前脉冲数据,并且执行来自用户的当前脉冲数据与用户的预期脉冲数据之间的比较。 该技术还涉及基于当前脉冲数据与预期脉冲数据之间的比较产生认证结果。 认证结果可以控制用户对计算机资源的访问。 由于这种技术使用脉冲数据,所以犯罪者不能简单地提交被摄体脸部的静态图像以绕过认证过程。 在某些安排中,该技术涉及从视频获得人脸视频和导出心脏脉搏率。 对于这样的安排,可以使用标准网络摄像头来捕获视频。 此外,这些技术能够考虑昼夜节奏和/或老化调整以检测和阻止视频重播攻击。
    • 10. 发明授权
    • Authentication involving authentication operations which cross reference authentication factors
    • 涉及认证操作的认证交叉参考认证因素
    • US08925058B1
    • 2014-12-30
    • US13434257
    • 2012-03-29
    • Yedidya DotanWilliam M. DuaneJohn LinnRoy HodgmanDerek Lin
    • Yedidya DotanWilliam M. DuaneJohn LinnRoy HodgmanDerek Lin
    • G06F7/04G06F15/16
    • H04L63/0861G06F21/31G06F21/32
    • A technique of authenticating a person involves obtaining, during a current authentication session to authenticate the person, a first authentication factor from the person and a second authentication factor from the person, at least one of the first and second authentication factors being a biometric input. The technique further involves performing an authentication operation which cross references the first authentication factor with the second authentication factor. The technique further involves outputting, as a result of the authentication operation, an authentication result signal indicating whether the authentication operation has determined the person in the current authentication session likely to be legitimate or an imposter. Such authentication, which cross references authentication factors to leverage off of their interdependency, provides stronger authentication than conventional naïve authentication.
    • 认证人的技术涉及在当前身份认证会话期间从人员获得第一认证因子和从人员获得第二认证因素,所述第一和第二认证因素中的至少一个是生物特征输入。 该技术还涉及执行认证操作,该认证操作以第二认证因素交叉引用第一认证因素。 该技术还包括作为认证操作的结果,输出一个认证结果信号,该认证结果信号指示认证操作是否已经确定当前认证会话中的人可能是合法的或冒牌者。 这种认证交叉引用认证因素以利用其相互依赖性,提供比传统初始认证更强大的认证。