Phishing Notification Service
    91.
    发明专利
    Phishing Notification Service 有权
    通知通知服务

    公开(公告)号:JP2014132500A

    公开(公告)日:2014-07-17

    申请号:JP2014084327

    申请日:2014-04-16

    IPC分类号: G06F21/44 G06F21/52

    CPC分类号: H04L63/1425 H04L63/1483

    摘要: PROBLEM TO BE SOLVED: To provide a method for providing protection from phishing attacks.SOLUTION: A method includes determining whether new phishing site identifiers (such as, but not limited to, URLs and/or IP addresses) have been created (212). Upon a determination that the new phishing site identifiers have been created, the new phishing site identifiers are compared to site identifiers of sites to which critical values (such as personal/confidential information of the user) have been provided in the past (214). Upon a determination that at least one of the new phishing site identifiers matches at least one of the site identifiers, a phishing notification is provided that the user has been phished in the past (218).

    摘要翻译: 要解决的问题:提供一种防止网络钓鱼攻击的方法。解决方案:一种方法包括确定是否已经创建了新的网络钓鱼站点标识符(例如但不限于URL和/或IP地址)(212)。 在确定已经创建新的网络钓鱼站点标识符之后,将新的网络钓鱼站点标识符与过去提供关键值(例如用户的个人/机密信息)的站点的站点标识符进行比较(214)。 在确定新的网络钓鱼站点标识符中的至少一个与站点标识符中的至少一个相匹配的情况下,提供了用户已过去被钓鱼的网络钓鱼通知(218)。

    Streaming malware definition updates
    92.
    发明专利
    Streaming malware definition updates 有权
    流行恶意软件定义更新

    公开(公告)号:JP2014130614A

    公开(公告)日:2014-07-10

    申请号:JP2014020997

    申请日:2014-02-06

    IPC分类号: G06F21/56

    CPC分类号: G06F21/56 G06F21/564

    摘要: PROBLEM TO BE SOLVED: To provide signature definition updates on a minute-by-minute basis when a signature definition is downloaded from an update server, as a countermeasure against malware, as well as to allow for reducing network bandwidth resource.SOLUTION: When a publication threshold time elapses, an updated full signature definition file is published. After the lapse of the publication threshold time, a mini drive file including the pointers of a plurality of delta definition files and the pointer of a storage area is received, the delta definition files each including a modification for the full signature definition file before updating, a version identifier associated with the full signature definition file installed in a client computer is compared with a version before updating identified by the mini drive file to identify information associated with a predetermined delta definition file, and the delta definition file is requested from the storage area.

    摘要翻译: 要解决的问题:当从更新服务器下载签名定义时,逐个提供签名定义更新,作为恶意软件的对策,以及允许减少网络带宽资源。解决方案:当 发布阈值时间过去,发布更新的完整签名定义文件。 在发布阈值时间过去之后,接收包括多个增量定义文件的指针和存储区域的指针的迷你驱动器文件,每个包括在更新之前的完整签名定义文件的修改的增量定义文件, 将与安装在客户端计算机中的完整签名定义文件相关联的版本标识符与由小型驱动器文件识别的更新之前的版本进行比较,以识别与预定的增量定义文件相关联的信息,并且从存储区域请求增量定义文件 。

    Method and apparatus to provide authentication and confidentiality of low complexity devices
    93.
    发明专利
    Method and apparatus to provide authentication and confidentiality of low complexity devices 有权
    提供低复杂设备的认证和保密性的方法和装置

    公开(公告)号:JP2014075787A

    公开(公告)日:2014-04-24

    申请号:JP2013193278

    申请日:2013-09-18

    摘要: PROBLEM TO BE SOLVED: To provide a method and apparatus to provide a cryptographic protocol for secure authentication, confidentiality, and anonymity.SOLUTION: A method comprises: authentication based on a use of a private key of a low processing power system; confidentiality to protect a tag identifier so that an unauthorized party cannot learn the tag identifier; and untraceability to ensure that a different value is returned in response to a challenge so that a reader cannot identify the low processing power system by the response.

    摘要翻译: 要解决的问题:提供一种提供用于安全认证,机密性和匿名性的密码协议的方法和装置。解决方案:一种方法包括:基于使用低处理能力系统的私钥的认证; 机密性以保护标签标识符,使得未授权方不能学习标签标识符; 和不可追踪性,以确保响应于挑战而返回不同的值,使得读取器不能通过响应来识别低处理能力系统。

    Failure processing system and method

    公开(公告)号:JP2013538409A

    公开(公告)日:2013-10-10

    申请号:JP2013529379

    申请日:2011-09-16

    IPC分类号: G06F3/06

    摘要: Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an error type detection process including determining if an error is a media error or a connectivity error; performing a detachment determination process to establish an appropriate detachment scenario, wherein the appropriate detachment scenario includes not detaching any mirrors if the connectivity error involves all mirrors; and returning an application write with a failure. In one embodiment, the detachment determination process detaches a mirror in accordance with results of a read-write-back process. In one exemplary implementation, the detachment determination process includes a connectivity status inquiry and mirrors are detached in accordance with results of the connectivity status inquiry. In one exemplary implementation, the connectivity status inquiry includes a SCSI connectivity inquiry. In one embodiment, consistency and synchronization is maintained between the mirrors by utilizing a read-write-back operation.