Data access security
    21.
    发明授权
    Data access security 有权
    数据访问安全

    公开(公告)号:US08788845B1

    公开(公告)日:2014-07-22

    申请号:US13525105

    申请日:2012-06-15

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    摘要: An execution environment of a computer computes an initial effective permissions set for managed code based on user identity evidence, code evidence and/or a security policy and executes the code with this permissions set. If the managed code requests a data access, the execution environment considers data evidence that indicates the trustworthiness of the requested data. The data evidence can be based on the source of the data, the location of the data, the content of the data itself, or other factors. The execution environment computes a new effective permissions set for the managed code based on the data evidence and the security policy. This new effective permissions set is applied to the managed code while the code accesses the data. The execution environment restores the initial permissions set once the managed code completes the data access.

    摘要翻译: 计算机的执行环境根据用户身份证据,代码证据和/或安全策略计算托管代码的初始有效权限集,并使用该权限集执行代码。 如果托管代码请求数据访问,则执行环境会考虑指示所请求数据的可信赖性的数据证据。 数据证据可以基于数据的来源,数据的位置,数据本身的内容或其他因素。 执行环境根据数据证据和安全策略计算托管代码的新的有效权限集。 当代码访问数据时,这个新的有效权限集应用于托管代码。 一旦托管代码完成数据访问,执行环境将恢复初始权限集。

    Systems and methods for looking up anti-malware metadata
    22.
    发明授权
    Systems and methods for looking up anti-malware metadata 有权
    查找反恶意软件元数据的系统和方法

    公开(公告)号:US08667592B2

    公开(公告)日:2014-03-04

    申请号:US13048380

    申请日:2011-03-15

    IPC分类号: G06F11/00

    CPC分类号: G06F21/564

    摘要: A computer-implemented method for looking up anti-malware metadata may include identifying a plurality of executable objects to be scanned for malware before execution. The computer-implemented method may also include, for each executable object within the plurality of executable objects, assessing an imminence of execution of the executable object. The computer-implemented method may further include prioritizing, based on the assessments, a retrieval order for anti-malware metadata corresponding to the plurality of executable objects. The computer-implemented method may additionally include retrieving anti-malware metadata corresponding to an executable object within the plurality of executable objects based on the retrieval order. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于查找反恶意软件元数据的计算机实现的方法可以包括在执行之前识别要扫描恶意软件的多个可执行对象。 对于多个可执行对象中的每个可执行对象,计算机实现的方法还可以包括执行可执行对象的即将来临。 计算机实现的方法还可以包括基于评估来优先考虑与多个可执行对象相对应的反恶意软件元数据的检索顺序。 计算机实现的方法可以另外包括基于检索顺序检索对应于多个可执行对象内的可执行对象的反恶意软件元数据。 还公开了各种其它方法,系统和计算机可读介质。

    User role determination based on content and application classification
    23.
    发明授权
    User role determination based on content and application classification 有权
    基于内容和应用程序分类的用户角色确定

    公开(公告)号:US08600995B1

    公开(公告)日:2013-12-03

    申请号:US13358396

    申请日:2012-01-25

    IPC分类号: G06F17/30

    摘要: The role of a user within an organization is automatically determined based on the classification of applications and content on the user's computer. Applications and files installed on a user's computer are identified. Identified applications and files that are not indicative of the role of the user within the organization are filtered out. The non-filtered out applications are functionally classified according to associated roles within the organization, based on predetermined functional classification information. The non-filtered out files are also functionally classified, based on predetermined functional classification information concerning types of files associated with specific organizational roles. The content of files that are of types not indicative of the user's organizational role can be analyzed, and these files can be functionally classified based on their content. The functional classifications are used in determining the role of the user.

    摘要翻译: 用户在组织内的角色将根据用户计算机上的应用程序和内容的分类自动确定。 识别安装在用户计算机上的应用程序和文件。 识别出的不是用户在组织内的角色的应用程序和文件被过滤掉。 基于预定的功能分类信息,未过滤的应用程序根据组织内的相关角色进行功能分类。 基于关于与特定组织角色相关联的文件类型的预定功能分类信息,未过滤掉的文件也被功能分类。 可以分析不指示用户组织角色的类型的文件的内容,并且可以基于其内容对这些文件进行功能分类。 功能分类用于确定用户的角色。

    Method and apparatus for enabling e-mail routing and filtering based on dynamic identities
    24.
    发明授权
    Method and apparatus for enabling e-mail routing and filtering based on dynamic identities 有权
    基于动态身份实现电子邮件路由和过滤的方法和装置

    公开(公告)号:US08566401B1

    公开(公告)日:2013-10-22

    申请号:US11644511

    申请日:2006-12-22

    IPC分类号: G06F15/16

    摘要: A method and apparatus for enabling e-mail routing and filtering based on dynamic identities is presented. In one embodiment, the method includes provisioning a new e-mail address, and notifying an e-mail backend of the provisioned address wherein the provisioned address includes a list of authorized senders.

    摘要翻译: 提出了一种基于动态身份实现电子邮件路由和过滤的方法和装置。 在一个实施例中,该方法包括提供新的电子邮件地址,以及通知电子邮件后端所提供的地址,其中所提供的地址包括授权发送者的列表。

    Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing
    25.
    发明授权
    Systems and methods for alternating malware classifiers in an attempt to frustrate brute-force malware testing 有权
    用于交替使用恶意软件分类器的系统和方法,以挫败强力恶意软件测试

    公开(公告)号:US08533831B2

    公开(公告)日:2013-09-10

    申请号:US12830084

    申请日:2010-07-02

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    IPC分类号: G06F21/00

    摘要: A computer-implemented method for alternating malware classifiers in an attempt to frustrate brute-force malware testing may include (1) providing a group of heuristic-based classifiers for detecting malware, wherein each classifier within the group differs from all other classifiers within the group but has an accuracy rate that is substantially similar to all other classifiers within the group, (2) including the group of classifiers within a security-software product, and (3) alternating the security-software product's use of the classifiers within the group in an attempt to frustrate brute-force malware testing by (a) randomly selecting and activating an initial classifier from within the group and then, upon completion of a select interval, (b) replacing the initial classifier with an additional classifier randomly selected from within the group. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于交替恶意软件分类器以试图挫败暴力恶意软件测试的计算机实现的方法可以包括(1)提供一组用于检测恶意软件的基于启发式的分类器,其中组内的每个分类器与组内的所有其他分类器不同 但是具有与组内的所有其他分类器基本相似的准确率,(2)包括安全软件产品内的分类器组,以及(3)交替安全软件产品在组内的分类器的使用 试图通过(a)从组内随机选择和激活初始分类器,然后在完成选择间隔之后,(b)用从其内部随机选择的附加分类器替换初始分类器来挫败强力恶意软件测试 组。 还公开了各种其它方法,系统和计算机可读介质。

    Uninstall and system performance based software application reputation
    26.
    发明授权
    Uninstall and system performance based software application reputation 有权
    卸载和基于系统性能的软件应用程序的声誉

    公开(公告)号:US08499063B1

    公开(公告)日:2013-07-30

    申请号:US12059258

    申请日:2008-03-31

    IPC分类号: G06F15/173

    摘要: Installation events associated with a software application are received from a plurality of clients. A rate at which the software application was uninstalled on the plurality of clients is determined based on the installation events. A reputation score is generated based on the rate at which the software application was uninstalled on the plurality of clients. A reputation score is generated for the software application responsive to the installation event and the performance data. The reputation score storied in association with the software application.

    摘要翻译: 从多个客户端接收与软件应用相关联的安装事件。 基于安装事件确定在多个客户端上卸载软件应用程序的速率。 基于在多个客户端上卸载软件应用程序的速率生成信誉分数。 响应于安装事件和性能数据,为软件应用程序生成声誉分数。 信誉评分与软件应用程序相关联。

    Enforcing digital rights management in a heterogeneous environment
    27.
    发明授权
    Enforcing digital rights management in a heterogeneous environment 有权
    在异构环境中实施数字版权管理

    公开(公告)号:US08468608B1

    公开(公告)日:2013-06-18

    申请号:US12414466

    申请日:2009-03-30

    IPC分类号: G06F7/04

    CPC分类号: G06F21/10 G06F2221/0728

    摘要: A DRM server parses a request received from a client for a content identifier and client classification information. The content identifier identifies the requested content and client classification information describes the capabilities of the client. The DRM server determines a policy for the requested content. The policy specifies rules for determining access rights for the content responsive to the capabilities of the client. The DRM server determines access rights for the requested content responsive to the capabilities of the client and the policy. The DRM manager then provides the requested content and the determined access rights to the client.

    摘要翻译: DRM服务器解析从客户端接收到的用于内容标识符和客户端分类信息的请求。 内容标识符识别所请求的内容,并且客户端分类信息描述客户端的能力。 DRM服务器确定所请求内容的策略。 该策略指定响应于客户端的能力确定内容的访问权限的规则。 响应于客户端的能力和策略,DRM服务器确定所请求的内容的访问权限。 然后,DRM管理器向客户端提供所请求的内容和确定的访问权限。

    Prioritizing tasks from virtual machines
    28.
    发明授权
    Prioritizing tasks from virtual machines 有权
    从虚拟机优先处理任务

    公开(公告)号:US08424007B1

    公开(公告)日:2013-04-16

    申请号:US12242685

    申请日:2008-09-30

    IPC分类号: G06F9/46

    摘要: A computer-implemented method for prioritizing virtual machine tasks may include receiving a request to perform a first task from a virtual machine. The request may include information relevant to determining a priority of the task. The method may include determining the priority of the task based on the information. The method may further include scheduling the first task based on the priority of the task. The method may include selecting the first task for execution based on the scheduling. The method may include notifying the virtual machine that the first task has been selected for execution. Various related methods, computer-readable media, and systems are also disclosed.

    摘要翻译: 用于对虚拟机任务进行优先级的计算机实现的方法可以包括从虚拟机接收执行第一任务的请求。 该请求可以包括与确定任务的优先级有关的信息。 该方法可以包括基于该信息确定任务的优先级。 该方法还可以包括基于任务的优先级调度第一任务。 该方法可以包括基于调度来选择用于执行的第一任务。 该方法可以包括通知虚拟机第一任务已经被选择用于执行。 还公开了各种相关方法,计算机可读介质和系统。

    Systems and methods for authenticating users
    29.
    发明授权
    Systems and methods for authenticating users 有权
    用于认证用户的系统和方法

    公开(公告)号:US08370926B1

    公开(公告)日:2013-02-05

    申请号:US12768157

    申请日:2010-04-27

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    IPC分类号: G06F7/04 G06F12/00

    CPC分类号: G06F21/36

    摘要: A computer-implemented method for authenticating users may include identifying an image associated with a user for mutual assurance during an authentication process. The computer-implemented method may also include modifying the image based on a prompt message to create a modified image that displays the prompt message. The computer-implemented method may further include determining that user input comprises an expected response to the prompt message. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于认证用户的计算机实现的方法可以包括在认证过程期间识别与用户相关联的图像以进行相互保证。 计算机实现的方法还可以包括基于提示消息修改图像以创建显示提示消息的修改图像。 计算机实现的方法还可以包括确定用户输入包括对提示消息的预期响应。 还公开了各种其它方法,系统和计算机可读介质。

    Methods and systems for defragmenting virtual machine prefetch data on physical storage
    30.
    发明授权
    Methods and systems for defragmenting virtual machine prefetch data on physical storage 有权
    在物理存储上对虚拟机预取数据进行碎片整理的方法和系统

    公开(公告)号:US08332570B1

    公开(公告)日:2012-12-11

    申请号:US12242734

    申请日:2008-09-30

    IPC分类号: G06F12/02 G06F9/455

    摘要: A computer-implemented method for defragmenting virtual machine prefetch data. The method may include obtaining prefetch information associated with prefetch data of a virtual machine. The method may also include defragmenting, based on the prefetch information, the prefetch data on physical storage. The prefetch information may include a starting location and length of the prefetch data on a virtual disk. The prefetch information may include a geometry specification of the virtual disk. Defragmenting on physical storage may include placing the prefetch data contiguously on physical storage, placing the prefetch data in a fast-access segment of physical storage, and/or ordering the prefetch data according to the order in which it is accessed at system or application startup.

    摘要翻译: 用于对虚拟机预取数据进行碎片整理的计算机实现的方法。 该方法可以包括获得与虚拟机的预取数据相关联的预取信息。 该方法还可以包括基于预取信息对物理存储器上的预取数据进行碎片整理。 预取信息可以包括虚拟磁盘上的预取数据的起始位置和长度。 预取信息可以包括虚拟磁盘的几何规格。 物理存储上的碎片整理可能包括将预取数据连续地放置在物理存储上,将预取数据放置在物理存储的快速访问段中,和/或根据系统或应用程序启动时访问顺序对预取数据进行排序 。