Search Ranger System and Double-Funnel Model for Search Spam Analyses and Browser Protection
    91.
    发明申请
    Search Ranger System and Double-Funnel Model for Search Spam Analyses and Browser Protection 有权
    搜索垃圾邮件分析和浏览器保护的游侠系统和双渠道模型

    公开(公告)号:US20080301281A1

    公开(公告)日:2008-12-04

    申请号:US11756603

    申请日:2007-05-31

    申请人: Yi-Min Wang Ming Ma

    发明人: Yi-Min Wang Ming Ma

    IPC分类号: G06F15/173

    摘要: An exemplary method for defeating server-side click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. An exemplary method for investigating client-side cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script. Other methods, systems, etc., are also disclosed.

    摘要翻译: 用于击败服务器端点击覆盖的示例性方法包括检索搜索结果页面以设置浏览器变量,将链接到页面插入到搜索结果页面中,并使用插入的链接点击页面。 用于调查客户端伪装的示例性方法包括提供与可疑垃圾邮件URL相关联的脚本,修改脚本以对脚本进行去模糊并执行修改的脚本以显示与该脚本相关联的伪装逻辑。 还公开了其它方法,系统等。

    Honey Monkey Network Exploration
    92.
    发明申请
    Honey Monkey Network Exploration 有权
    蜂蜜猴网络探索

    公开(公告)号:US20070208822A1

    公开(公告)日:2007-09-06

    申请号:US11276483

    申请日:2006-03-01

    IPC分类号: G06F15/16

    摘要: A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine. Also, the accomplishment of exploits may be detected by tracing events occurring on a machine after visiting a network site and analyzing the traced events for illicit behavior. Alternatively, site redirections between and among uniform resource locators (URLs) may be explored to discover relationships between sites that are visited.

    摘要翻译: 可以探索一个网络来调查剥削行为。 例如,网络站点可以由蜂蜜猴系统积极探索,以检测它们是否能够在机器上完成包括基于浏览器的漏洞的利用。 此外,通过在访问网站后跟踪机器上发生的事件并分析违规行为的跟踪事件,可以检测到攻击的完成。 或者,可以探索统一资源定位符(URL)之间的站点重定向以发现被访问的站点之间的关系。

    Pattern-and model-based power line monitoring
    94.
    发明授权
    Pattern-and model-based power line monitoring 有权
    基于模式和模型的电力线监测

    公开(公告)号:US07133729B1

    公开(公告)日:2006-11-07

    申请号:US09641556

    申请日:2000-08-17

    IPC分类号: G05B15/00

    摘要: Power line monitoring is disclosed. The monitoring can be performed in conjunction with an automation system designed to control and monitor devices and sensors. Model-based power line monitoring uses a model of acceptable power line activity. Activity that does not conform to the model is tagged as indicating a potential problem. Pattern-based power line monitoring uses patterns of unacceptable power line activity. Activity that matches one of the patterns is also tagged as indicating a potential problem.

    摘要翻译: 公开了电力线监测。 监控可以与设计用于控制和监视设备和传感器的自动化系统一起执行。 基于模型的电力线监测使用可接受的电力线活动模型。 不符合模型的活动被标记为指示潜在的问题。 基于模式的电力线监测使用不可接受的电力线活动模式。 匹配其中一个模式的活动也被标记为指示潜在的问题。

    Managing spyware and unwanted software through auto-start extensibility points
    98.
    发明申请
    Managing spyware and unwanted software through auto-start extensibility points 审中-公开
    通过自动启动扩展点管理间谍软件和垃圾软件

    公开(公告)号:US20050268112A1

    公开(公告)日:2005-12-01

    申请号:US10952336

    申请日:2004-09-28

    CPC分类号: G06F21/51 G06F21/554

    摘要: A monitoring service is provided that detects spyware or other unwanted software at the time it is installed and/or allows for the spyware's removal. The service monitors “Auto-Start Extensibility Points” (“ASEPs”) to detect spyware installations. ASEPs refer to the configuration points that can be “hooked” to allow programs to be auto-started without explicit user invocation. Such a service is particularly effective because an overwhelming majority of spyware programs infect systems in such a way that they are automatically started upon reboot and the launch of many commonly used applications. The monitoring service can thus lead to the subsequent complete removal of the spyware installation, and does not require a frequent signature-based cleaning. Spyware that is bundled with other software such as freeware or shareware can also be removed.

    摘要翻译: 提供了一种监视服务,用于在安装时检测间谍软件或其他不需要的软件和/或允许间谍软件的删除。 该服务监视“自动启动扩展点”(“ASEP”)以检测间谍软件安装。 ASEP是指可以“挂钩”以允许程序在没有显式用户调用的情况下自动启动的配置点。 这样的服务是特别有效的,因为绝大多数间谍软件程序以这样的方式感染系统,使得它们在重新启动时自动启动并启动许多常用的应用程序。 因此,监视服务可以导致间谍软件安装的后续完全删除,并且不需要频繁的基于签名的清理。 与其他软件(如免费软件或共享软件)捆绑在一起的间谍软件也可以被删除。

    Accelerating a distributed component architecture over a network using a direct marshaling
    100.
    发明申请
    Accelerating a distributed component architecture over a network using a direct marshaling 审中-公开
    使用直接编组加速通过网络的分布式组件架构

    公开(公告)号:US20050071857A1

    公开(公告)日:2005-03-31

    申请号:US10966508

    申请日:2004-10-14

    IPC分类号: G06F3/00 G06F9/44 G06F9/46

    CPC分类号: G06F9/547 G06F9/465

    摘要: A method for improving the performance of a distributed object model over a network is disclosed. A client computer contains a client object which can call an interface on a server object located on a server computer. Rather than copying all of the call parameters into an RPC buffer for transmission across the network, a network interface card with scatter-gather capability can be used. The RPC data can contain only a list of pointers into the client memory and a size of each parameter. The network interface card can then grab the parameters directly from the client memory using the list in the RPC buffer without the need to copy the data itself. At the server side, the network interface card can place the parameters into an RPC buffer, or if the size is known beforehand, directly into the server memory. The server can also access the parameters directly from the RPC buffer. On the return, the server can use a callback function to indicate when its network interface card has finished sending the response data so that the server does not clear its memory prematurely. At the client side, if the size of the response is not known, and the data is placed into the RPC buffers, it can be copied from the RPC buffer into the client memory.

    摘要翻译: 公开了一种通过网络改善分布式对象模型的性能的方法。 客户端计算机包含可以调用位于服务器计算机上的服务器对象上的接口的客户端对象。 可以使用具有分散收集功能的网络接口卡,而不是将所有呼叫参数复制到RPC缓冲区中,以便通过网络进行传输。 RPC数据只能包含指向客户机内存的指针列表和每个参数的大小。 然后,网络接口卡可以使用RPC缓冲区中的列表直接从客户端存储器中获取参数,而无需复制数据本身。 在服务器端,网络接口卡可以将参数放入RPC缓冲区,或者如果事先知道大小,则直接进入服务器内存。 服务器也可以直接从RPC缓冲区访问参数。 返回时,服务器可以使用回调函数来指示其网络接口卡何时完成发送响应数据,以致服务器不能过早清除其内存。 在客户端,如果响应的大小不知道,并且数据被放置到RPC缓冲区中,则可以将其从RPC缓冲区复制到客户端存储器中。