Systems and methods for determining authorship of an unclassified notification message
    91.
    发明授权
    Systems and methods for determining authorship of an unclassified notification message 有权
    用于确定未分类通知消息的作者身份的系统和方法

    公开(公告)号:US08935154B1

    公开(公告)日:2015-01-13

    申请号:US13446081

    申请日:2012-04-13

    IPC分类号: G06F17/27

    CPC分类号: G06F17/27

    摘要: A computer-implemented method for determining authorship of an unclassified notification message is described. An unclassified notification message with one or more target sentences is received. A message model based on one or more classified notification messages stored in a data storage device is retrieved. One or more linguistic analysis procedures are performed on the one or more target sentences. Results of the one or more linguistic analysis procedures are compared with one or more characteristics of the message model. The unclassified notification message is classified based on the results of the comparison.

    摘要翻译: 描述了一种用于确定未分类通知消息的作者身份的计算机实现的方法。 收到具有一个或多个目标句子的未分类通知消息。 检索基于存储在数据存储设备中的一个或多个分类通知消息的消息模型。 对一个或多个目标句子执行一个或多个语言分析程序。 将一个或多个语言分析程序的结果与消息模型的一个或多个特征进行比较。 未分类的通知消息根据比较结果进行分类。

    Systems and methods for exonerating untrusted software components
    92.
    发明授权
    Systems and methods for exonerating untrusted software components 有权
    免除不可信软件组件的系统和方法

    公开(公告)号:US08918873B1

    公开(公告)日:2014-12-23

    申请号:US12550198

    申请日:2009-08-28

    IPC分类号: G06F12/14

    CPC分类号: G06F21/57 G06F2221/2145

    摘要: The instant disclosure describes various exemplary systems and methods for exonerating an untrusted software component based solely on a trusted software component's non-optional or “hard” dependency on the untrusted software component. In one example, a method for exonerating untrusted software components in this manner may include: 1) identifying a dependent software component, 2) determining that the dependent software component is a non-optional dependent component of at least one trusted software component, and then 3) classifying the dependent software component as a trusted software component. As detailed herein, such a method may enable security software to quickly and efficiently exonerate untrusted components by association without having to scan or perform other intrusive and/or resource-intensive security operations on such untrusted software components.

    摘要翻译: 本公开描述了仅基于可信软件组件对不可信软件组件的非可选或“硬”依赖性来排除不可信软件组件的各种示例性系统和方法。 在一个示例中,以这种方式排除不信任软件组件的方法可以包括:1)识别从属软件组件,2)确定依赖软件组件是至少一个可信软件组件的非可选依赖组件,然后 3)将依赖软件组件分类为可信软件组件。 如这里所详细描述的,这种方法可以使得安全软件能够通过关联来快速有效地排除不信任的组件,而不必扫描或执行对这种不受信任的软件组件的其他侵入和/或资源密集型安全操作。

    Evaluating relying parties
    93.
    发明授权
    Evaluating relying parties 有权
    评估依赖方

    公开(公告)号:US08887273B1

    公开(公告)日:2014-11-11

    申请号:US12884870

    申请日:2010-09-17

    IPC分类号: G06F11/00

    摘要: Determining reputation information is disclosed. A honey token is included in an online identity data. The honey token is to monitor for misuse of all or part of the online identity data. Optionally, information associated with at least one use of the honey token is aggregated with other reputation information.

    摘要翻译: 公开了确定信誉信息。 蜂蜜令牌包含在线身份数据中。 蜂蜜令牌是监控滥用全部或部分在线身份数据。 可选地,与蜂蜜令牌的至少一个使用相关联的信息与其他信誉信息进行聚合。

    Method and apparatus for providing identity claim validation
    94.
    发明授权
    Method and apparatus for providing identity claim validation 有权
    用于提供身份声明验证的方法和装置

    公开(公告)号:US08788836B1

    公开(公告)日:2014-07-22

    申请号:US11644579

    申请日:2006-12-22

    IPC分类号: G06F21/00

    摘要: A method and apparatus for providing claim validation without storing user information within the IDM system. During enrollment, the IDM system creates a hash representative of the identification information provided by a user. The user information is discarded, i.e., not stored within the IDM system. Only a hash representing that information is stored within the system. Upon a user providing information to a service provider, the service provider requests that the user's information be authenticated by a third party IDS system. The service provider will request such authentication from the IDM system identified by the user. The IDM system generates, from the user's information that was provided to the service provider, a signed token that is sent to the user for use by the user to access the service provider's services. In this manner, the IDM system does not store identification information of the user. Yet, the IDM system provides identification validation services to any service provider requesting such services to ensure that a user is authentic.

    摘要翻译: 一种用于提供权利要求验证而不在IDM系统内存储用户信息的方法和装置。 在注册期间,IDM系统创建由用户提供的识别信息的哈希表示。 用户信息被丢弃,即不存储在IDM系统内。 只有表示该信息的哈希存储在系统中。 当用户向服务提供商提供信息时,服务提供商请求用户的信息由第三方IDS系统认证。 服务提供商将从用户识别的IDM系统请求此类认证。 IDM系统从提供给服务提供商的用户的信息中生成发送给用户以供用户访问服务提供商的服务的签名令牌。 以这种方式,IDM系统不存储用户的识别信息。 然而,IDM系统向请求这样的服务的任何服务提供商提供识别验证服务,以确保用户是真实的。

    Endpoint management using trust rating data
    95.
    发明授权
    Endpoint management using trust rating data 有权
    端点管理使用信任评级数据

    公开(公告)号:US08763076B1

    公开(公告)日:2014-06-24

    申请号:US13488419

    申请日:2012-06-04

    IPC分类号: H04L29/06

    摘要: Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired.

    摘要翻译: 公开了实现动态端点管理的技术。 根据一个实施例,每当端点首次加入受管网络或重新加入该网络时,本地安全模块将应用列表(例如全部或增量)提交给安全服务器。 服务器验证列表,并发送这些应用程序的规则集(例如,允许/阻止规则和/或必需的应用程序安全设置)。 如果服务器没有给定应用程序的信息,它可以进一步订阅来自内容提供商或服务的内容。 当服务器查询未知应用程序时,服务器向服务提供商发送查询以获得该未知应用程序的信任等级。 然后可以使用信任评级来为未知应用程序生成规则集。 如果需要,功能可以从服务器转移到客户端,反之亦然。

    Systems and methods for user-specific tuning of classification heuristics
    96.
    发明授权
    Systems and methods for user-specific tuning of classification heuristics 有权
    用于用户特定调整分类启发式的系统和方法

    公开(公告)号:US08626675B1

    公开(公告)日:2014-01-07

    申请号:US12559943

    申请日:2009-09-15

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    IPC分类号: G06F15/18

    CPC分类号: G06N5/003 G06N5/00

    摘要: A computer-implemented method for user-specific tuning of classification heuristics may include: 1) identifying a trusted software component on the computing device that has been excluded from analysis by a classification heuristic, 2) applying the classification heuristic to the trusted software component, 3) determining that the classification heuristic incorrectly classified the trusted software component, and then 4) lowering a confidence score associated with the classification heuristic.

    摘要翻译: 用于用户特定的分类启发式调谐的计算机实现方法可以包括:1)通过分类启发式来识别已经从分析排除的计算设备上的可信软件组件,2)将分类启发式应用于可信软件组件, 3)确定分类启发式错误地分类可信软件组件,然后4)降低与分类启发式相关联的置信度分数。

    Detecting malware through package behavior
    97.
    发明授权
    Detecting malware through package behavior 有权
    通过包行为检测恶意软件

    公开(公告)号:US08499350B1

    公开(公告)日:2013-07-30

    申请号:US12511885

    申请日:2009-07-29

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    CPC分类号: G06F21/566

    摘要: A file on a computer system is evaluated against trust criteria to determine whether the file is compatible with the trust criteria. Responsive to the file being incompatible with the trust criteria, the file is assigned to a package. Files assigned to the package are tracked to determine whether the files collectively perform malicious behavior. The package is convicted as malware responsive to the files in the package collectively performing malicious behavior.

    摘要翻译: 根据信任条件对计算机系统上的文件进行评估,以确定文件是否与信任条件兼容。 响应于与信任条件不兼容的文件,该文件被分配给一个包。 跟踪分配给包的文件,以确定文件是否集体执行恶意行为。 该软件包被定罪为恶意软件,响应包中的文件,共同执行恶意行为。

    Method to improve data loss prevention via cross leveraging fingerprints
    98.
    发明授权
    Method to improve data loss prevention via cross leveraging fingerprints 有权
    通过交叉杠杆指纹来改进数据丢失预防的方法

    公开(公告)号:US08250085B1

    公开(公告)日:2012-08-21

    申请号:US12338943

    申请日:2008-12-18

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    IPC分类号: G06F7/00

    摘要: A method and system for improving data loss prevention via cross leveraging fingerprints of protected data is described. In one embodiment, fingerprints of sensitive data of multiple organizations are shared across data loss prevention (DLP) systems of these organizations. A DLP system of each organization monitors information content associated with this organization to detect sensitive data of other organizations, and notifies one or more users within the organization upon detecting sensitive data of other organizations. In addition, a report of external data loss detection is provided to users within an organization whose sensitive data is detected in information content of the other organizations.

    摘要翻译: 描述了一种通过交叉利用受保护数据指纹来改善数据丢失预防的方法和系统。 在一个实施例中,多个组织的敏感数据的指纹在这些组织的数据丢失预防(DLP)系统之间共享。 每个组织的DLP系统监视与该组织相关联的信息内容以检测其他组织的敏感数据,并在检测到其他组织的敏感数据后通知组织内的一个或多个用户。 另外,在其他组织的信息内容中检测到敏感数据的组织内的用户提供外部数据丢失检测报告。

    Method for secure system shutdown
    99.
    发明授权
    Method for secure system shutdown 有权
    安全系统关机的方法

    公开(公告)号:US08181028B1

    公开(公告)日:2012-05-15

    申请号:US12140993

    申请日:2008-06-17

    IPC分类号: G06F21/00

    摘要: In one embodiment, a key list entry corresponding to a user's private key is securely deleted from a key list of a user device on shutdown of the user device. Subsequently, input of the user's private key will not allow decryption of an encrypted partition storing encrypted data on the user device. In another embodiment, a key list entry corresponding to a user's private key is automatically and securely re-provisioned on boot up of the user device. Subsequently, input of the user's private key will allow decryption of the encrypted partition on the user device.

    摘要翻译: 在一个实施例中,在用户设备关机时,从用户设备的密钥列表中安全地删除与用户私钥相对应的密钥列表条目。 随后,用户私钥的输入将不允许对在用户设备上存储加密数据的加密分区进行解密。 在另一个实施例中,在用户设备的启动时,自动且安全地重新配置对应于用户私钥的密钥列表条目。 随后,用户私钥的输入将允许对用户设备上的加密分区进行解密。

    Method and apparatus to enable confidential browser referrals
    100.
    发明授权
    Method and apparatus to enable confidential browser referrals 有权
    启用机密浏览器转介的方法和设备

    公开(公告)号:US08156228B1

    公开(公告)日:2012-04-10

    申请号:US11864348

    申请日:2007-09-28

    IPC分类号: G06F15/16

    CPC分类号: H04L67/2814 H04L67/02

    摘要: A method of facilitating a blind referral comprising producing a referral communication for referring a client computer from a connection with a first server to a second server, wherein the referral communication comprises first server information defining a location of the first server, generating a placeholder for the first server information in the referral communication, and replacing the first server information with the placeholder in communications with the second server during the referral communication.

    摘要翻译: 一种促进盲目转介的方法,包括产生用于将客户计算机从与第一服务器的连接引用到第二服务器的推荐通信,其中所述推荐通信包括定义所述第一服务器的位置的第一服务器信息, 第一服务器信息在推荐通信中,并且在推荐通信期间用与第二服务器通信的占位符替换第一服务器信息。