-
公开(公告)号:US09824218B1
公开(公告)日:2017-11-21
申请号:US14920773
申请日:2015-10-22
Applicant: GOOGLE INC.
Inventor: Erik Kay , Robert Shield , Marc-Andre Decoste , Dominic Battre , William James Budge, Jr.
IPC: G06F21/57
CPC classification number: G06F21/57 , G06F21/64 , G06F2221/034
Abstract: A computer implemented method includes generating a first cryptographic hash based on at least one setting associated with an operating system at a first time, storing the first cryptographic hash as a first bit string, generating a second cryptographic hash as a second bit string, wherein the second cryptographic hash is based on the at least one setting associated with the operating system at a second time, determining that a setting associated with the operating system has changed and that the setting change was made outside of the operating system based on a comparison of the first and second bit strings, and if the setting change was made outside of the operating system, setting the setting to a default value.
-
公开(公告)号:US09894050B1
公开(公告)日:2018-02-13
申请号:US14823522
申请日:2015-08-11
Applicant: GOOGLE INC.
Inventor: Erik Lewis Wright , Erik Kay , Robert Shield
CPC classification number: H04L63/08 , G06F17/30876
Abstract: In one general aspect, a method can include receiving, by an application running on a computing device, an indication that a user of the computing device has been authenticated, and receiving a selection of a settings page, the settings page associated with the application and the user. The method can further include requesting the settings page for display on a display device included in the computing device, and receiving the settings page including a value for a preference for a setting included on the settings page, the value for the preference being signed by a private key associated with the user. The method can further include validating, by the application, the value for the preference using a public key associated with the application, and based on the validation, displaying, by the display device, the settings page including an indication of the value of the preference for the setting.
-
公开(公告)号:US09298585B1
公开(公告)日:2016-03-29
申请号:US14156394
申请日:2014-01-15
Applicant: Google Inc.
Inventor: Chris Sharp , Robert Shield
CPC classification number: G06F11/0793 , G06F11/0706
Abstract: Techniques for blacklisting of fault generating software code are provided. An example method includes receiving crash reports of a plurality of browsers, a crash report including an identification of one or more executables related to a software crash of a browser, wherein software code of the executables is included in a memory space of the browser during the software crash, analyzing the crash reports of the browsers to determine a browser component affected by software code of an executable included in respective memory spaces of the browsers to cause one or more software crashes of the browsers, computing, for the executable, a fault level based on a number of crashes of the browser component that is associated with the executable and a number of crashes of the browser component independent of the executable, and including an identifier representing the executable in a list based on the determined fault level.
Abstract translation: 提供了故障生成软件代码黑名单技术。 示例性方法包括接收多个浏览器的崩溃报告,崩溃报告,包括与浏览器的软件崩溃相关的一个或多个可执行程序的标识,其中可执行文件的软件代码包括在浏览器的存储器空间中 软件崩溃,分析浏览器的崩溃报告,以确定受浏览器的相应存储空间中包含的可执行程序的软件代码影响的浏览器组件,导致浏览器的一个或多个软件崩溃,计算可执行文件的故障级别 基于与可执行文件相关联的浏览器组件的多次崩溃以及与可执行文件无关的多个浏览器组件的崩溃,并且基于所确定的故障级别包括表示可执行程序的标识符在列表中。
-
公开(公告)号:US09177150B1
公开(公告)日:2015-11-03
申请号:US14096559
申请日:2013-12-04
Applicant: GOOGLE INC.
Inventor: Erik Kay , Robert Shield , Marc-Andre Decoste , Dominic Battre , William James Budge, Jr.
IPC: G06F21/57
CPC classification number: G06F21/57 , G06F21/64 , G06F2221/034
Abstract: A computer implemented method includes generating a first cryptographic hash based on at least one setting associated with a browser at a first time, storing the first cryptographic hash as a first bit string, generating a second cryptographic hash as a second bit string, wherein the second cryptographic hash is based on the at least one setting associated with the browser at a second time, determining that a setting associated with the browser has changed and that the setting change was made outside of the browser based on a comparison of the first and second bit strings, and if the setting change was made outside of the browser, setting the setting to a default value.
Abstract translation: 计算机实现的方法包括:基于与第一时间与浏览器相关联的至少一个设置来生成第一密码散列,将第一密码散列作为第一位串存储,生成第二密码散列作为第二位串,其中第二密码散列 加密散列基于与第二时间与浏览器相关联的至少一个设置,基于第一和第二位的比较,确定与浏览器相关联的设置已经改变,并且设置改变是在浏览器之外进行的 字符串,并且如果设置更改是在浏览器之外进行的,请将设置设置为默认值。
-
-
-