-
21.
公开(公告)号:US07669117B2
公开(公告)日:2010-02-23
申请号:US10803619
申请日:2004-03-18
申请人: Jordi Albornoz , Avijit Chatterjee , Lee D. Feigenbaum , Sean J. Martin , Lonnie A. McCullough , Herschel J. R. Weintraub
发明人: Jordi Albornoz , Avijit Chatterjee , Lee D. Feigenbaum , Sean J. Martin , Lonnie A. McCullough , Herschel J. R. Weintraub
IPC分类号: G06F17/00
CPC分类号: G06F17/241 , G06F17/2235 , Y10S707/99943 , Y10S707/99945
摘要: Methods, systems, and articles of manufacture for managing global annotations made for data elements that may be instantiated (e.g., displayed) by a variety of different type applications are provided. By anchoring the global annotations to the data element, rather than the particular data source containing the data element at the time the data element was annotated, the annotation may be retrieved from any application that instantiates or displays it.
摘要翻译: 提供了用于管理针对可由各种不同类型的应用程序实例化(例如显示)的数据元素的全局注释的方法,系统和制品。 通过将全局注释锚定到数据元素,而不是在数据元素注释时包含数据元素的特定数据源,可以从实例化或显示注释的任何应用程序检索注释。
-
公开(公告)号:US20050086500A1
公开(公告)日:2005-04-21
申请号:US10686156
申请日:2003-10-15
申请人: Jordi Albornoz
发明人: Jordi Albornoz
CPC分类号: G06F21/552 , G06F21/316 , G06F21/554
摘要: A system, method and computer readable medium for detecting intrusions is disclosed. The method on a computer includes receiving a behavior profile associated with an application and reading the behavior profile associated with the application. The method further includes monitoring execution of the application, according to the behavior profile. If the behavior of the application does not conform to the behavior profile, a message is issued indicating that the application is not conforming to the behavior profile. The behavior profile can be generated by a developer of the intrusion detection system, a developer of the application, and/or a third party developer. Additionally, the behavior profile is generated by executing the system on a reference computer system or by heuristic determination.
摘要翻译: 公开了一种用于检测入侵的系统,方法和计算机可读介质。 计算机上的方法包括接收与应用程序相关联的行为简档并读取与应用程序相关联的行为简档。 该方法还包括根据行为简档来监视应用的执行。 如果应用程序的行为不符合行为配置文件,则会发出指示应用程序不符合行为配置文件的消息。 行为简档可以由入侵检测系统的开发者,应用的开发者和/或第三方开发者生成。 另外,通过在参考计算机系统上执行系统或通过启发式确定来生成行为简档。
-