Detection and dynamic alteration of execution of potential software threats
    11.
    发明申请
    Detection and dynamic alteration of execution of potential software threats 有权
    检测和动态改变潜在软件威胁的执行

    公开(公告)号:US20090100520A1

    公开(公告)日:2009-04-16

    申请号:US11974457

    申请日:2007-10-12

    IPC分类号: G06F21/00

    摘要: An arrangement for dynamically identifying and intercepting potential software threats before they execute on a computer system is provided in which a file system filter driver (called a “mini-filter”) interfaces with an anti-malware service to selectively generate an alert event and allow the threat to run, in addition to generating an alert event and suspending the threat. The decision to suspend the threat or allow it to run is made through application of a cascading logic hierarchy that includes respective policy-defined actions, user-defined actions, and signature-defined actions. The mini-filter generates the alert event to the anti-malware service whenever a file is opened, or modified and closed. The service uses an engine to scan the file to identify potential threats which are handled though application of the logic hierarchy which provides for configurations defined in a lower tier of the hierarchy to be overridden by those contained in a higher tier.

    摘要翻译: 提供了一种用于在计算机系统上执行之前动态识别和拦截潜在软件威胁的布置,其中文件系统过滤器驱动程序(称为“微型过滤器”)与反恶意软件服务接口以选择性地生成警报事件并允许 除了产生警报事件和暂停威胁之外,运行的威胁。 暂停威胁或允许其运行的决定是通过应用级联逻辑层次结构来实现的,层级逻辑层次结构包括相应的策略定义的动作,用户定义的动作和签名定义的动作。 微型过滤器在打开或修改和关闭文件时,向反恶意软件服务生成警报事件。 该服务使用引擎来扫描文件,以识别通过应用逻辑层次结构处理的潜在威胁,逻辑层次结构提供在层次结构的较低层中定义的配置将被包含在较高层中的层覆盖。

    Interoperable credential gathering and access modularity
    14.
    发明申请
    Interoperable credential gathering and access modularity 有权
    可互操作的凭证采集和访问模块化

    公开(公告)号:US20050091213A1

    公开(公告)日:2005-04-28

    申请号:US10693585

    申请日:2003-10-24

    摘要: A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.

    摘要翻译: 用不同凭证提供者模块之一翻译凭证,每个凭证提供者模块将相应的不同类型的凭证翻译成公共协议。 翻译的凭证通过API传送到登录UI模块到本地机器的操作系统(OS)。 登录UI模块调用操作系统登录模块,以根据凭据数据库验证转换的凭据。 当认证成功时,由登录的凭证登录的用户访问本地计算机。 证书还可以与从登录UI模块通过每个与API进行通信的不同预登录访问提供程序(PLAP)模块中的相应一个模块接收到的选择一起使用。 当凭证凭证凭证数据库进行身份验证时,API与所选择的PLAP模块指定的访问服务建立网络会话。

    System and method for aggregating and extending parental controls auditing in a computer network
    16.
    发明授权
    System and method for aggregating and extending parental controls auditing in a computer network 有权
    用于在计算机网络中聚合和扩展家长控制审计的系统和方法

    公开(公告)号:US07389346B2

    公开(公告)日:2008-06-17

    申请号:US10823277

    申请日:2004-04-13

    摘要: A system and method for aggregating and extending parental controls auditing in an unmanaged computing network are provided. A parental control system, including a parental control database, logging interface, and audit process, resides on each host computing device in an unmanaged computing network that is capable of synchronizing data residing on one of the host computing devices with data residing on the other devices in the network. The parental control system facilitates the logging and reporting of parental control audit information in a manner that allows parents to aggregate the audit information to obtain a comprehensive audit report of their children's use of all computers in the home, and is extensible and customizable by the applications from which the parental control audit information originates.

    摘要翻译: 提供了一种用于在非管理计算网络中聚合和扩展家长控制审计的系统和方法。 家长控制系统(包括家长控制数据库,记录接口和审核过程)驻留在非托管计算网络中的每个主机计算设备上,其能够将驻留在主机计算设备之一上的数据与驻留在其他设备上的数据进行同步 在网络中。 父母控制系统有助于父母控制审计信息的记录和报告,允许父母汇总审核信息,以获得他们孩子在家中使用所有计算机的全面审核报告,并且可由应用程序进行扩展和定制 父母控制审计信息来自哪里。

    Aggregating trust services for file transfer clients
    18.
    发明申请
    Aggregating trust services for file transfer clients 有权
    为文件传输客户端聚合信任服务

    公开(公告)号:US20050132227A1

    公开(公告)日:2005-06-16

    申请号:US10898298

    申请日:2004-07-23

    摘要: A trust evaluation framework exposes a common interface that may be used by file transfer clients in the process of retrieving or downloading a file. Using the common interface, each file transfer client can take advantage of multiple trust providers to evaluate the incoming file. In this way, disparate file transfer clients can present a common user experience for downloading or retrieving files. In addition, trust providers may be updated or added to the system without modifying the installed file transfer clients. This enables the user experience to be incrementally improved without updating the installed programs.

    摘要翻译: 信任评估框架公开了文件传输客户端在检索或下载文件的过程中可以使用的公共接口。 使用通用接口,每个文件传输客户机可以利用多个信任提供者来评估传入文件。 以这种方式,不同的文件传输客户端可以呈现用于下载或检索文件的通用用户体验。 此外,信任提供者可能会更新或添加到系统中,而无需修改已安装的文件传输客户端。 这样可以在不更新安装的程序的情况下逐步改进用户体验。

    System and method for prioritizing computers based on anti-malware events
    19.
    发明授权
    System and method for prioritizing computers based on anti-malware events 有权
    基于反恶意软件事件对计算机进行优先排序的系统和方法

    公开(公告)号:US08719942B2

    公开(公告)日:2014-05-06

    申请号:US12704391

    申请日:2010-02-11

    IPC分类号: H04L29/06

    摘要: Tracking malware state information assigned to computers in an enterprise network is described. A computer may transition from a current malware state to a new malware state in accordance with a plurality of stored rules and detection of an anti-malware event on the computer. Examples of anti-malware events include, but are not limited to, detection of new malware on the computer or cleaning of the computer. The malware state information for computers on the network may be mapped to a risk level representing an amount of risk that infected computers present to other computers on the network. The results of a risk level assessment for the computers on the network may be output via a user interface to enable an administrator of the network to prioritize servicing of computers with detected malware.

    摘要翻译: 描述分配给企业网络中计算机的恶意软件状态信息。 计算机可以根据多个存储的规则从计算机上的反恶意软件事件的检测从当前恶意软件状态转换到新的恶意软件状态。 反恶意软件事件的示例包括但不限于检测计算机上的新恶意软件或清洁计算机。 网络上计算机的恶意软件状态信息可能被映射到一个风险级别,该风险级别表示受感染计算机存在于网络上其他计算机的风险。 可以通过用户界面输出网络上计算机的风险级别评估结果,以使网络的管理员可以优先处理检测到恶意软件的计算机的服务。

    SYSTEM AND METHOD FOR PRIORITIZING COMPUTERS BASED ON ANTI-MALWARE EVENTS
    20.
    发明申请
    SYSTEM AND METHOD FOR PRIORITIZING COMPUTERS BASED ON ANTI-MALWARE EVENTS 有权
    基于反恶意事件优化计算机的系统和方法

    公开(公告)号:US20110197277A1

    公开(公告)日:2011-08-11

    申请号:US12704391

    申请日:2010-02-11

    摘要: Tracking malware state information assigned to computers in an enterprise network is described. A computer may transition from a current malware state to a new malware state in accordance with a plurality of stored rules and detection of an anti-malware event on the computer. Examples of anti-malware events include, but are not limited to, detection of new malware on the computer or cleaning of the computer. The malware state information for computers on the network may be mapped to a risk level representing an amount of risk that infected computers present to other computers on the network. The results of a risk level assessment for the computers on the network may be output via a user interface to enable an administrator of the network to prioritize servicing of computers with detected malware.

    摘要翻译: 描述分配给企业网络中计算机的恶意软件状态信息。 计算机可以根据多个存储的规则从计算机上的反恶意软件事件的检测从当前恶意软件状态转换到新的恶意软件状态。 反恶意软件事件的示例包括但不限于检测计算机上的新恶意软件或清洁计算机。 网络上计算机的恶意软件状态信息可能被映射到一个风险级别,该风险级别表示受感染计算机存在于网络上其他计算机的风险。 可以通过用户界面输出网络上计算机的风险级别评估结果,以使网络的管理员可以优先处理检测到恶意软件的计算机的服务。