Device security system
    31.
    发明授权
    Device security system 有权
    设备安全系统

    公开(公告)号:US08789175B2

    公开(公告)日:2014-07-22

    申请号:US12894918

    申请日:2010-09-30

    IPC分类号: G06F21/00

    CPC分类号: G08B25/001 G08B13/1418

    摘要: A computer-implemented method may include identifying a security event condition associated with a device. One or more security rules may be identified for execution based on the device and the identified security event condition, wherein the one or more security rules define security related actions to be performed upon occurrence of the security event condition. The security related actions may be initiated by at least one processor on the device to secure the device from unauthorized use.

    摘要翻译: 计算机实现的方法可以包括识别与设备相关联的安全事件条件。 可以基于设备和所识别的安全事件条件来识别用于执行的一个或多个安全规则,其中所述一个或多个安全规则定义在安全事件条件发生时要执行的安全相关动作。 与安全相关的动作可以由设备上的至少一个处理器启动,以保护设备免受未经授权的使用。

    CONTEXT-SENSITIVE USER DEVICE CONTROL PROFILE
    32.
    发明申请
    CONTEXT-SENSITIVE USER DEVICE CONTROL PROFILE 有权
    内容敏感的用户设备控制配置文件

    公开(公告)号:US20120036344A1

    公开(公告)日:2012-02-09

    申请号:US12850992

    申请日:2010-08-05

    IPC分类号: G06F15/177 G06F15/16

    摘要: A method including receiving control profile information that controls one or more operations of a user device during an event associated with a user; generating a control profile based on the control profile information; controlling the one or more operations of the user device based on the control profile for a duration of the event; and automatically setting the user device to a previous state or a new state after the event transpires.

    摘要翻译: 一种方法,包括在与用户相关联的事件期间接收控制用户设备的一个或多个操作的控制简档信息; 基于所述控制简档信息生成控制简档; 在所述事件的持续时间内基于所述控制简档来控制所述用户设备的所述一个或多个操作; 并在事件发生后自动将用户设备设置为先前状态或新状态。

    AUDIO FREQUENCY REMAPPING
    34.
    发明申请
    AUDIO FREQUENCY REMAPPING 有权
    音频频率重新取代

    公开(公告)号:US20100094619A1

    公开(公告)日:2010-04-15

    申请号:US12252058

    申请日:2008-10-15

    IPC分类号: G10L21/00

    摘要: An exemplary system and method are directed at receiving an audio signal and process the audio signal into a remapped audio signal based on a plot profile. The plot profile may include at least one of an identified range of audio frequencies. The processing may comprise retrieving an identified range of audio frequencies from the plot profile; determining a range of impaired audio frequencies in the audio signal based on the identified range of audio frequencies; shifting the frequency of at least a portion of the impaired audio frequencies to outside of the identified range; and continuing to retrieve identified ranges of audio frequencies from the plot profile. The shifting of the impaired audio frequencies of the audio signal may be performed until no further identified ranges of audio frequencies are available for consideration.

    摘要翻译: 一个示例性的系统和方法是针对接收音频信号,并且基于曲线轮廓将音频信号处理成重新映射的音频信号。 剧情简档可以包括所识别的音频范围中的至少一个。 该处理可以包括从绘图轮廓中检索所识别的音频范围; 基于所识别的音频范围来确定所述音频信号中受损音频的范围; 将受损音频的至少一部分的频率移动到所识别的范围之外; 并继续从绘图剖面中检索识别的音频范围。 可以执行音频信号的受损音频的移位,直到没有进一步识别的音频范围可用于考虑。

    MALWARE DETECTION DEVICE
    35.
    发明申请
    MALWARE DETECTION DEVICE 有权
    恶意软件检测装置

    公开(公告)号:US20090293126A1

    公开(公告)日:2009-11-26

    申请号:US12126571

    申请日:2008-05-23

    IPC分类号: G06F11/00

    CPC分类号: G06F21/562

    摘要: An exemplary malware detection device includes a data pathway provided between a first data transfer device and a second data transfer device and a processor attached to the data pathway. A memory accessible by the processor contains at least one malware signature and instructions for controlling the processor to interconnect the first and second data transfer devices, direct at least a portion of a data transfer across the data pathway to the processor for analysis, independently analyze the portion of the data transfer using the malware signature, identify malware contained in the portion of the data transfer, and interrupt the data transfer based on the identification of malware.

    摘要翻译: 示例性恶意软件检测设备包括设置在第一数据传送设备和第二数据传送设备之间的数据路径以及附着到数据路径的处理器。 处理器可访问的存储器包含至少一个恶意软件签名和用于控制处理器以互连第一和第二数据传输设备的指令,将跨数据路径的数据传输的至少一部分引导到处理器进行分析,独立地分析 使用恶意软件签名的部分数据传输,识别数据传输部分中包含的恶意软件,并根据恶意软件的识别中断数据传输。