Abstract:
A password management service located either on a user computer or in the cloud intercepts a user's attempt to create an account on a Web site. The user enters a sequence of a physical key combination and the service assigns a particular keyboard layout for this Web site. The service generates a password by combining the key combination with the assigned keyboard layout and returns this password to the user or to the Web site. The service stores the name of the Web site in association with the designated keyboard layout. Upon a subsequent login attempt, the service again intercepts the user's typing of the same physical key combination, generates the same password by combining the key combination with the previously assigned and stored keyboard layout, and returns the generated password to the Web site for authentication. A keyboard layout for a site may be chosen by the user, may be selected by the service, or a random layout may be generated. The service enforces a password constraint of a site by adding in the required characters, by requiring the user to choose a new key combination, or by using a different keyboard layout.
Abstract:
Generating an exception list by a service provider for use in behavior monitoring programs for malware detection is described. A feedback server controlled by a malware prevention service provider receives client process reports from client devices owned by the service provider's customers and others using the provider's behavior monitoring software. The process reports contain data on processes that were evaluated (on the client device) as being processes that require a significant amount of CPU resources (i.e., above a certain threshold) to monitor and that have previously executed on the client device and were considered safe or non-harmful to the device. The feedback server receives the process reports and creates a statistics summary report, which is used by the service provider in evaluating whether to include the processes in the provider's official exception list which is distributed to its customers for use in their behavior monitoring programs. While creating the process reports on the client devices, the devices are able to temporarily address issues caused by processes taking up too much of the behavior monitor's CPU usage by including the process on exception list only for that client. The final decision as to whether the process will be on the final or official exception list is made by the service provider.
Abstract:
Two images are compared to determine how similar they are. First, a process normalizes each image, then horizontal and vertical byte sequences are derived from each image. A similarity formula is used to obtain a similarity value that represents the similarity between the two images. An approximate pattern matching algorithm is used to determine the error distance between the horizontal byte sequences for the images and to determine the error distance between the vertical byte sequences for the images. The error distances and the length of the byte sequences are used to determine the similarity value. Padding is used to make the aspect ratios the same.
Abstract:
The invention relates to methods and apparatus for offloading the workload from a computer system's CPU, memory and/or memory controller. Methods and apparatus for managing board memory on a FPGA board on behalf of applications executing in one or more FPGAs are disclosed.
Abstract:
A computer or its user can prevent the installation of spyware on the computer by having a program that continuously observes and collects data on execution and installation behavior on the computer. This behavior can relate to execution of any application or installation of any type of software. The program uses various installation detection programs and an event collector that continuously observes and gathers data on execution and installation activities on the computer. The program then uses pre-defined rules to determine whether the behavior or activity correlates to spyware installation, which can occur through various methods and means that are often difficult to detect. However, by establishing a comprehensive set of rules that focus on the spyware installation behavior, the program of the present invention is able to detect when spyware is likely being installed and either alert the user who can prevent further installation or execution or automatically do so.
Abstract:
The invention relates, in an embodiment, to a computer-implemented method for handling a target document, the target document having been transmitted electronically and involving an encoding scheme. The method includes training, using a plurality of text document samples, to obtain a set of machine learning models. Training includes using SIM (Similarity Algorithm) to generate the set of machine learning models from feature vectors obtained from the plurality of text document samples. The method also includes applying the set of machine learning models against a set of target document feature vectors converted from the target document to detect the encoding scheme. The method including decoding the target document to obtain decoded content of the document based on at least the first encoding scheme.
Abstract:
When an event (for example, an e-mail message) is received at a server it is saved into a log file (or a summary is saved). The log entry for each message includes a set of groups within an organization to which the message is considered to belong. An administrator who has authority over any one of those groups is allowed to view this message. When an administrator logs onto the system it is determined which group or groups the administrator owns, i.e., for which groups the administrator has the authority to view their e-mail messages. For each e-mail log entry it is determined whether there is a group in common between the set of groups stored in the log entry and the groups that the administrator owns. A group in common indicates that the administrator is allowed to view that particular e-mail message.
Abstract:
A virus detection engine determines that a file is suspected of being malware. A property is retrieved, along with the same file property of other executable files within the same folder. If the property value is similar to property values of the other files then the suspect file is benign. If the number of matches is greater than a threshold then the suspect file is benign. Other file properties of the suspect file are compared. If no file properties are similar to properties of the other files then the suspect file is malware and an alert is generated. The longest common subsequence compares property values. The same property value may be added to files within the same folder after these files are installed on the computer but before any detection takes place. A comparison of the same property values concludes that files are not malware, even if they are suspect.
Abstract:
Each time a version of a virus pattern is downloaded to a local computer a scanned file cache is generated including all files scanned by that version. A modified file cache is also generated including all files modified while that version is present. After a minimum time interval or after a minimum number of virus pattern versions, a white list is generated by combining the existing white list, versions of the scanned file cache and the modified file cache. The white list (and the other caches) is represented by a single binary digit per file that is indexed by the i-node number of the file's i-node. A bundle of files (or their unique identifiers) on the white list is created and uploaded to a cloud storage service. A local computer sends a request to the storage service for the white list for a particular bundle which is then downloaded to the local computer.
Abstract:
A security virtual machine is provided in a network including a resource shared among two or more virtual machines. All data traffic from each virtual machine to or from the shared resource is transmitted over an encrypted channel to the security virtual machine. Each connection between a virtual machine and the security virtual machine is maintained as a separate encrypted channel, preventing one virtual machine from accessing data sent to or from another virtual machine, even though the virtual machines are all sharing the same resource.