摘要:
The present invention utilizes honeypots, which are messaging system resources set up to attract unauthorized or illicit use thereof, for automatically identifying messages with malignant content. As messages are received at a honeypot, fingerprints of the messages are generated, which correspond to pattern information within the messages. These fingerprints are then used to determine a confidence level that messages received at a legitimate messaging service are malignant. Based on the confidence level, various actions (e.g., deleting the malignant content) may be executed.
摘要:
The present invention utilizes existing encapsulation or encoding mechanisms for embedding user profile information in electronic messages. Such information may then be distributed amid a community of users for which an individual, organization or other entity interact. The present invention takes advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at client user interface, for including the user profile information. The user profiles may be stored in a repository of user profiles, wherein a recipient of the user profiles may subsequently query the repository using keywords for accessing desired information about individuals or organizations for which they interact with.
摘要:
Provided is a messaging system capable of detecting and processing at least a portion of a malformed message, e.g., a message that previously failed to process. An identifier and state information for the message can be logged. Based on the stored information, a determination can be made that the message previously failed to process. The message can then progressively be de-featured until the message can be processed or until the message is determined to be poisonous, whereupon it can be deleted or otherwise removed from the message stream permanently or temporarily-including moving the message to storage for operator inspection or for delayed delivery.
摘要:
The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in accordance with a standard messaging transport protocol. By utilizing an already existing port of the standard messaging transport protocol, e.g., SMTP, the number of open ports for configuration purposes is minimized. Further, example embodiments take advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at a client user interface, for encoding the configuration or command/control information within the messages. The present invention further provides for a central console module that can manage and report on the status of the configuration settings for a plurality of targeted devices that an authorized user or system administrator has attempted to remotely configure.
摘要:
The present invention relates to systems and methods that determine intent for received data (e.g., email, voice, graphics . . . ) and respond to the data based on the intent. The systems and methods employ various combinations of features based on shallow and deep linguistic analysis (e.g., semantic and syntactic) to yield very high accuracy. The systems and methods analyze and categorize received data to locate data that can include intent. This data can be further refined by extracting features related to the intent. The features can be utilized by a classifier to determine the intent. If the intent warrants a response, the data are further scrutinized and reformulated to generate a description that is indicative of the intent. The reformulation can include representing the features in a logical form, transforming the form and generating a description of the intent that can be presented to a user visually and/or audibly.
摘要:
The present invention allows for remotely and securely configuring settings for targeted devices within a network with multiple security-trust boundaries. Configuration information is encoded in messages that are digitally signed to ensure the integrity of the configuration information and sent in accordance with a standard messaging transport protocol. By utilizing an already existing port of the standard messaging transport protocol, e.g., SMTP, the number of open ports for configuration purposes is minimized. Further, example embodiments take advantage of hidden fields, i.e., machine readable fields that contain metadata that by default are not presented at a client user interface, for encoding the configuration or command/control information within the messages. The present invention further provides for a central console module that can manage and report on the status of the configuration settings for a plurality of targeted devices that an authorized user or system administrator has attempted to remotely configure.
摘要:
The present invention provides for methods, systems, and computer program products for ensuring that sensitive subject matter within electronic messages is not inappropriately transferred between domains with differing security rights. The present invention utilizes the appropriate placement of message transfer agents or servers along with policy documents that include configurable semantics pattern recognition data for identifying deviant messages. Once deviant messages or messages that potentially have sensitive subject matter are identified, the present invention further provides for adaptable actions or remedies for ensuring that the sensitive subject matter is not inappropriately transferred between domains.
摘要:
A method of calibration transfer for a testing instrument includes: collecting a first sample; generating a standard response of a first instrument based, at least in part, on the first sample; and performing instrument standardization of a second instrument based, at least in part, on the standard response of the first instrument. Data corresponding to a second sample is then obtained using the second instrument and a component of the second sample is identified based, at least in part, on a calibration model.
摘要:
Various embodiments include apparatus and methods to monitor flow of single and multiple phase fluids. Sensors of a tool can be dispersed along the tool to collect measurements to be processed using an autocorrelation operation on the collected measurements to provide information relative to the phases of the fluid. Additional apparatus, systems, and methods are disclosed.
摘要:
Disclosed herein is a door stop pin assembly including a pin and a base pad. The pin has a concave spherical recess. And, the base pad has an open end and a closed end such that the open end has a convex spherical portion in contact with the concave spherical recess.