会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • FLOW DATA FOR SECURITY DATA LOSS PREVENTION
    • 流量数据用于安全数据丢失
    • US20130276108A1
    • 2013-10-17
    • US13444774
    • 2012-04-11
    • Aaron Kenneth Blackwell
    • Aaron Kenneth Blackwell
    • G06F21/00
    • G06F21/554G06F21/552
    • There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data attached to transactions as they flow through one or more software applications. A transaction that is processed by a sequence of software components that execute on one or more electronic devices may be traced. Data that is associated with the transaction as the transaction flows through the sequence of software components may be accessed. The accessed data may be analyzed to detect a possible security violation. The accessed data may be compared to one or more pre-defined patterns. The transaction may be intercepted upon detection of a possible security violation.
    • 存在用于检测和防止计算机网络中可能的安全违规的技术。 安全违规检测可以基于在事务流经一个或多个软件应用时附加到事务的数据。 可以跟踪由在一个或多个电子设备上执行的软件组件序列处理的事务。 可以访问随着事务流过软件组件序列而与事务相关联的数据。 可以分析访问的数据以检测可能的安全违规。 访问的数据可以与一个或多个预定义的模式进行比较。 检测到可能的安全违规后,交易可能被拦截。
    • 5. 发明授权
    • Method and apparatus for correlation of events in a distributed multi-system computing environment
    • 分布式多系统计算环境中事件相关的方法和装置
    • US07003781B1
    • 2006-02-21
    • US09564929
    • 2000-05-05
    • Aaron Kenneth BlackwellAage BendiksenBenny TsengZhongliang LuAmal Shah
    • Aaron Kenneth BlackwellAage BendiksenBenny TsengZhongliang LuAmal Shah
    • G06F9/00
    • G06F11/3495G06F2201/86
    • A method and system is disclosed for monitoring an operation of a distributed data processing system. The system can include a plurality of applications running on a plurality of host processors and communicating with one another, such as through a message passing technique. The method includes steps executed in individual ones of the plurality of applications, of (a) examining individual ones of generated API calls to determine if a particular API call meets predetermined API call criteria; (b) if a particular API call meets the predetermined API call criteria, storing all or a portion of the content of the API call as a stored event; (c) processing a plurality of the stored events to identify logically correlated events, such as those associated with a business transaction; and (d) displaying all or a portion of the stored API call content data for the logically correlated events.
    • 公开了用于监视分布式数据处理系统的操作的方法和系统。 系统可以包括在多个主机处理器上运行的多个应用程序并且例如通过消息传递技术彼此进行通信。 该方法包括在多个应用中的各个应用中执行的步骤,(a)检查生成的API呼叫中的各个,以确定特定的API呼叫是否符合预定的API呼叫准则; (b)如果特定的API呼叫符合预定的API呼叫标准,将API呼叫的所有内容或一部分内容存储为存储的事件; (c)处理多个所存储的事件以识别与业务交易相关联的逻辑相关事件; 和(d)显示用于逻辑相关事件的存储的API调用内容数据的全部或一部分。
    • 6. 发明授权
    • Flow data for security data loss prevention
    • 用于安全数据丢失预防的流量数据
    • US08789181B2
    • 2014-07-22
    • US13444774
    • 2012-04-11
    • Aaron Kenneth Blackwell
    • Aaron Kenneth Blackwell
    • H04L29/06
    • G06F21/554G06F21/552
    • There are techniques for detecting and preventing possible security violations in a computer network. The security violation detection may be based on data attached to transactions as they flow through one or more software applications. A transaction that is processed by a sequence of software components that execute on one or more electronic devices may be traced. Data that is associated with the transaction as the transaction flows through the sequence of software components may be accessed. The accessed data may be analyzed to detect a possible security violation. The accessed data may be compared to one or more pre-defined patterns. The transaction may be intercepted upon detection of a possible security violation.
    • 存在用于检测和防止计算机网络中可能的安全违规的技术。 安全违规检测可以基于在事务流经一个或多个软件应用时附加到事务的数据。 可以跟踪由在一个或多个电子设备上执行的软件组件序列处理的事务。 可以访问随着事务流过软件组件序列而与事务相关联的数据。 可以分析访问的数据以检测可能的安全违规。 访问的数据可以与一个或多个预定义的模式进行比较。 检测到可能的安全违规后,交易可能被拦截。