摘要:
At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model is identified. The HTTP message model includes a plurality of message model sections. Additional steps include parsing a representation of the at least one of an HTTP request message and an HTTP response message into message sections in accordance with the message model sections of the HTTP message model; and binding a plurality of security rules to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition. The given condition is based, at least in part, on a corresponding given one of the message sections. A further step includes processing the at least one of an HTTP request message and an HTTP response message in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.
摘要:
A method and system for detecting a source-related risk and generating an alert concerning the source-related risk are disclosed. Criteria of the source-related risk are defined. Thresholds associated with the source-related risk are defined. Every operation on an object is detected. If an operation on an object satisfies a criterion among the criteria or if the operation causes to exceed a threshold among the thresholds, an alert is generated for the operation.
摘要:
A supported catalyst and process for dehydrogenating a hydrocarbon, the catalyst comprising a first component selected from the group consisting of tin, germanium, lead, indium, gallium, thallium, and compounds thereof; a second component selected from the group consisting of metals of Group 8 of the Periodic Table of the Elements and compounds thereof, and a support comprising alumina in the gamma crystalline form. The catalysts are especially active and efficient when employed in concurrent flow in a dehydrogenation reactor having an average contact time between the hydrocarbon and catalyst of from 0.5 to 10 seconds
摘要:
A method and system for detecting a source-related risk and generating an alert concerning the source-related risk are disclosed. Criteria of the source-related risk are defined. Thresholds associated with the source-related risk are defined. Every operation on an object is detected. If an operation on an object satisfies a criterion among the criteria or if the operation causes to exceed a threshold among the thresholds, an alert is generated for the operation.
摘要:
The present invention relates to RF-amide peptides and their use for treating, preventing and curing neurological and metabolic medical disorders. The invention also relates to methods for modulating a G-protein coupled receptor and for identifying substances which modulate the receptor.
摘要:
This invention discloses a method of frequency band group partition for wideband audio codec. It can determine the initial frequency band group partition within the whole effective range of frequency bands. It further subdivides frequency band groups based on the initial partition. Instead of the iteration-based algorithm, this invention applies the 1-from-2 and 1-from-3 criterions to accomplish the fast partition with at most 3 subdivisions. This invention implements the fast partition for frequency band group without the loss of the coding efficiency. By applying this fast partition method, one can greatly reduce the computational complexity and significantly improve the coding performance.
摘要:
A process to prepare an olefin from its corresponding alcohol is improved by reacting, under reaction conditions including a first temperature, an aliphatic alcohol and, optionally, diluent water, to form a reaction product including at least a dialkyl ether. The product is then reacted again, under higher temperature to complete the dehydration of the dialkyl ether to the desired olefin. This process is particularly suitable to prepare ethene from ethyl alcohol. The stepped temperature scheme serves to reduce the formation of byproduct aldehydes, which in turn reduces coke formation, fouling, and the need to handle large amounts of water, thereby lowering energy and capital costs.
摘要:
In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance.
摘要:
At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model is identified. The HTTP message model includes a plurality of message model sections. Additional steps include parsing a representation of the at least one of an HTTP request message and an HTTP response message into message sections in accordance with the message model sections of the HTTP message model; and binding a plurality of security rules to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition. The given condition is based, at least in part, on a corresponding given one of the message sections. A further step includes processing the at least one of an HTTP request message and an HTTP response message in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.
摘要:
A computer-implemented method, apparatus, and article of manufacture for security validation of a user input in a computer network application. The method includes: providing a subset of security rules of a server-side protection means to a pre-validation component deployed at a client side, so as to enable security validation of a user input on the client side by the pre-validation component; validating the user input based on at least one of the security rules; determining, in response to detecting a user input violation and that a violated security rule has not been provided to the pre-validation component, the user as a first class of users; determining, in response to detecting the user input violation and that the violated security rule has been provided to the pre-validation component, the user as a second class of users; and performing different security protection actions to the first and second class of users.