摘要:
PROBLEM TO BE SOLVED: To provide a method for providing protection from phishing attacks.SOLUTION: A method includes determining whether new phishing site identifiers (such as, but not limited to, URLs and/or IP addresses) have been created (212). Upon a determination that the new phishing site identifiers have been created, the new phishing site identifiers are compared to site identifiers of sites to which critical values (such as personal/confidential information of the user) have been provided in the past (214). Upon a determination that at least one of the new phishing site identifiers matches at least one of the site identifiers, a phishing notification is provided that the user has been phished in the past (218).
摘要:
PROBLEM TO BE SOLVED: To provide signature definition updates on a minute-by-minute basis when a signature definition is downloaded from an update server, as a countermeasure against malware, as well as to allow for reducing network bandwidth resource.SOLUTION: When a publication threshold time elapses, an updated full signature definition file is published. After the lapse of the publication threshold time, a mini drive file including the pointers of a plurality of delta definition files and the pointer of a storage area is received, the delta definition files each including a modification for the full signature definition file before updating, a version identifier associated with the full signature definition file installed in a client computer is compared with a version before updating identified by the mini drive file to identify information associated with a predetermined delta definition file, and the delta definition file is requested from the storage area.
摘要:
PROBLEM TO BE SOLVED: To provide a method and apparatus to provide a cryptographic protocol for secure authentication, confidentiality, and anonymity.SOLUTION: A method comprises: authentication based on a use of a private key of a low processing power system; confidentiality to protect a tag identifier so that an unauthorized party cannot learn the tag identifier; and untraceability to ensure that a different value is returned in response to a challenge so that a reader cannot identify the low processing power system by the response.
摘要:
Computer-implemented methods and systems for creating or updating approved-file and trusted-domain databases and verifying the legitimacy of files are disclosed. A method for creating or updating an approved-file database may comprise intercepting a first file, identifying a source domain associated with the first file, identifying a trusted-domain database, determining whether a database record for the source domain associated with the first file exists within the trusted-domain database, creating a hash value for the first file if a database record for the source domain associated with the first file exists within the trusted-domain database, and storing the hash value for the first file in an approved-file database. Methods and systems for verifying the legitimacy of a file and for creating or updating a trusted-domain database are also disclosed.
摘要:
The disclosure is directed to systems and methods for patching computer programs. In one example, a patch is virtually installed to a computing device having a base file system and configuration, a computer program, and a patch layering subsystem. The virtual installation may include storing content of the patch to a patch layer, and generating and storing mapping data defining at least one relationship between the content in the patch layer and content in the base file system and configuration. The virtually installed patch may be enabled, including applying the mapping data to the patch layering subsystem such that the patch layering subsystem is configured for selectively redirecting access requests from the base file system and configuration to the patch layer. In certain embodiments, the enabled patch may be disabled by reversing the application of the mapping data to the patch layering subsystem.
摘要:
Systems and methods for fault handling are presented. In one embodiment, a fault handling method includes: performing an error type detection process including determining if an error is a media error or a connectivity error; performing a detachment determination process to establish an appropriate detachment scenario, wherein the appropriate detachment scenario includes not detaching any mirrors if the connectivity error involves all mirrors; and returning an application write with a failure. In one embodiment, the detachment determination process detaches a mirror in accordance with results of a read-write-back process. In one exemplary implementation, the detachment determination process includes a connectivity status inquiry and mirrors are detached in accordance with results of the connectivity status inquiry. In one exemplary implementation, the connectivity status inquiry includes a SCSI connectivity inquiry. In one embodiment, consistency and synchronization is maintained between the mirrors by utilizing a read-write-back operation.
摘要:
Method and apparatus for managing digital identities through a single interface is described. One aspect of the invention relates to managing digital identities related to a user. An identity policy of an entity is obtained. At least one relevant digital identity is selected from the digital identities. Each relevant digital identity includes information required by the identity policy. A selected digital identity is obtained from the relevant digital identity or identities. A representation of the selected digital identity is provided to the entity that complies with the identity policy.