CLOUD BASED SYSTEMS AND METHODS FOR DETERMINING SECURITY RISKS OF USERS AND GROUPS

    公开(公告)号:US20170353483A1

    公开(公告)日:2017-12-07

    申请号:US15171013

    申请日:2016-06-02

    IPC分类号: H04L29/06 G06F17/30

    摘要: Systems and method are implemented by one or more servers associated with a cloud-based security system, for determining security risks of entities including users or groups of users associated with the cloud-based security system and optimizing remediation based thereon. The method includes maintaining logs of transactions through the cloud-based security system; obtaining a plurality of attributes from the transactions while excluding impossible comparison items from the transactions; performing empirical scoring on normalizing the plurality of attributes for ranking risky entities; identifying the risky entities based on one of the empirical scoring and analytics; and updating policies and/or monitoring in the cloud-based system based on the identifying. The cloud-based security system is multi-tenant system supporting a plurality of users, companies, and/or enterprises and the empirical scoring provides a deterministic comparison between the plurality of users, companies, and/or enterprises in the multi-tenant system.

    Method and system for storing binary large objects (BLObs) in a distributed key-value storage system
    44.
    发明授权
    Method and system for storing binary large objects (BLObs) in a distributed key-value storage system 有权
    在分布式键值存储系统中存储二进制大对象(BLObs)的方法和系统

    公开(公告)号:US09002907B2

    公开(公告)日:2015-04-07

    申请号:US12978464

    申请日:2010-12-24

    IPC分类号: G06F17/30

    CPC分类号: G06F17/30486

    摘要: A technique for storing binary large objects (BLObs) in a distributed key-value storage system is disclosed. In an embodiment, the storage of BLObs involves dividing the BLObs into smaller “BLOb chunks” and storing the BLOb chunks in storage nodes of the distributed key-value storage system. A BLOb is first associated with a key, referred to as a “BLOb key,” and each subsequent BLOb chunk is associated with a different unique key, referred to as a “BLOb chunk key.” A list of the BLOb chunks keys is maintained and all of the BLOb chunks of the BLOb can be retrieved from the distributed key-value storage system using the BLOb chunks key list.

    摘要翻译: 公开了一种用于在分布式键值存储系统中存储二进制大对象(BLOB)的技术。 在一个实施例中,BLOb的存储包括将BLOB分成更小的“BLOb块”,并将BLOb块存储在分布式键值存储系统的存储节点中。 BLOb首先与被称为“BLOb密钥”的密钥相关联,并且每个后续的BLOb块与不同的唯一密钥相关联,称为“BLOb块密钥”。维护BLOb块密钥的列表 并且可以使用BLOb块密钥列表从分布式密钥值存储系统检索BLOb的所有BLOb块。

    Systems and methods for detecting email spam and variants thereof
    45.
    发明授权
    Systems and methods for detecting email spam and variants thereof 有权
    用于检测电子邮件垃圾邮件的系统和方法及其变体

    公开(公告)号:US08495737B2

    公开(公告)日:2013-07-23

    申请号:US13038144

    申请日:2011-03-01

    摘要: The present disclosure provides systems and methods for detecting email spam and variants thereof. The systems and methods are configured to detect spam messages and variations thereof for different senders and with slight differences within the message body. In an exemplary embodiment, an incoming message body (m) is converted to a sequence of successive word lengths (Sm): m->Sm, a comparison is performed between the sequence, Sm, and a plurality of stored sequences (Sk) of known spam messages, and the incoming message is flagged as spam based on the comparison. Further, the plurality of stored sequences, Sk, may be continually updated based on user feedback and other spam detection techniques. The systems and methods of the present invention may be implemented through a computer, such as a mail server, through a cloud-based security system, through a user's computer via a software agent, and the like.

    摘要翻译: 本公开提供了用于检测电子邮件垃圾邮件及其变体的系统和方法。 系统和方法被配置为检测针对不同发送者的垃圾邮件及其变体,并且在消息体内具有微小的差异。 在一个示例性实施例中,输入消息体(m)被转换为连续字长(Sm)的序列:m→Sm,在序列Sm与多个存储的序列(Sk)之间进行比较 已知垃圾邮件,并且根据比较将传入的邮件标记为垃圾邮件。 此外,可以基于用户反馈和其他垃圾邮件检测技术来连续地更新多个存储的序列Sk。 本发明的系统和方法可以通过诸如邮件服务器的计算机,通过基于云的安全系统,经由用户的计算机经由软件代理等来实现。

    SYSTEMS AND METHODS FOR DETECTING EMAIL SPAM AND VARIANTS THEREOF
    46.
    发明申请
    SYSTEMS AND METHODS FOR DETECTING EMAIL SPAM AND VARIANTS THEREOF 有权
    用于检测电子邮件和其变体的系统和方法

    公开(公告)号:US20120227104A1

    公开(公告)日:2012-09-06

    申请号:US13038144

    申请日:2011-03-01

    IPC分类号: G06F21/00 G06F15/16

    摘要: The present disclosure provides systems and methods for detecting email spam and variants thereof. The systems and methods are configured to detect spam messages and variations thereof for different senders and with slight differences within the message body. In an exemplary embodiment, an incoming message body (m) is converted to a sequence of successive word lengths (Sm): m->Sm, a comparison is performed between the sequence, Sm, and a plurality of stored sequences (Sk) of known spam messages, and the incoming message is flagged as spam based on the comparison. Further, the plurality of stored sequences, Sk, may be continually updated based on user feedback and other spam detection techniques. The systems and methods of the present invention may be implemented through a computer, such as a mail server, through a cloud-based security system, through a user's computer via a software agent, and the like.

    摘要翻译: 本公开提供了用于检测电子邮件垃圾邮件及其变体的系统和方法。 系统和方法被配置为检测针对不同发送者的垃圾邮件及其变体,并且在消息体内具有微小的差异。 在一个示例性实施例中,输入消息体(m)被转换为连续字长(Sm)的序列:m→Sm,在序列Sm与多个存储的序列(Sk)之间进行比较 已知垃圾邮件,并且根据比较将传入的邮件标记为垃圾邮件。 此外,可以基于用户反馈和其他垃圾邮件检测技术来连续地更新多个存储的序列Sk。 本发明的系统和方法可以通过诸如邮件服务器的计算机,通过基于云的安全系统,经由用户的计算机经由软件代理等来实现。

    SYSTEMS AND METHODS FOR MOBILE APPLICATION SECURITY CLASSIFICATION AND ENFORCEMENT
    47.
    发明申请
    SYSTEMS AND METHODS FOR MOBILE APPLICATION SECURITY CLASSIFICATION AND ENFORCEMENT 有权
    用于移动安全分类和执行的系统和方法

    公开(公告)号:US20110167474A1

    公开(公告)日:2011-07-07

    申请号:US13051519

    申请日:2011-03-18

    IPC分类号: G06F12/14 G06F17/00

    摘要: The present disclosure provides systems and methods for mobile application security classification and enforcement. In particular, the present invention includes a method, a mobile device, and a distributed security system (e.g., a “cloud”) that is utilized to enforce security on mobile devices communicatively coupled to external networks (i.e., the Internet). Advantageously, the present invention is platform independent allowing it to operate with any current or emerging mobile device. Specifically, preventing malicious applications from running on an end user's mobile device is challenging with potentially millions of applications and billions of user devices; the only effective way to enforce application security is through the network that applications use to communicate.

    摘要翻译: 本公开提供了用于移动应用安全分类和执行的系统和方法。 特别地,本发明包括一种方法,移动设备和分布式安全系统(例如,“云”),其用于在通信地耦合到外部网络(即因特网)的移动设备上实施安全性。 有利地,本发明是平台独立的,允许其与任何当前或新兴移动设备一起操作。 具体来说,防止恶意应用程序在最终用户的移动设备上运行对于数百万应用程序和数十亿用户设备来说具有挑战性; 实施应用程序安全的唯一有效方法是通过应用程序用于通信的网络。

    Method and apparatus for performing digital timing recovery on oversampled 802.11b baseband signals
    48.
    发明授权
    Method and apparatus for performing digital timing recovery on oversampled 802.11b baseband signals 有权
    在过采样802.11b基带信号上执行数字定时恢复的方法和装置

    公开(公告)号:US07295601B1

    公开(公告)日:2007-11-13

    申请号:US10639384

    申请日:2003-08-12

    IPC分类号: H04B1/38

    CPC分类号: H04L7/042

    摘要: An apparatus and method for performing digital timing recovery includes a rotating demultiplexor receiving a four times oversampled baseband signal and providing four downsampled phases at respective outputs. Each output is processed by a correlation detector which computes a peak sum signal for each downsampled phase. The peak sum signals are processed to produce a best phase select output signal. The best phase select output signal is used to select the optimum sampling phase. Symbol timing is then determined based on the relative peak offset in the best downsampled phase.

    摘要翻译: 用于执行数字定时恢复的装置和方法包括旋转解复用器,其接收四次过采样基带信号并在相应输出端提供四个下采样相位。 每个输出由相关检测器处理,相关检测器计算每个下采样相位的峰值和信号。 处理峰值和信号以产生最佳相位选择输出信号。 最佳相位选择输出信号用于选择最佳采样相位。 然后基于最佳下采样相位中的相对峰值偏移来确定符号定时。

    Systems and methods for wireless intrusion detection using spectral analysis
    49.
    发明申请
    Systems and methods for wireless intrusion detection using spectral analysis 有权
    使用光谱分析进行无线入侵检测的系统和方法

    公开(公告)号:US20070173199A1

    公开(公告)日:2007-07-26

    申请号:US11332065

    申请日:2006-01-13

    申请人: Amit Sinha

    发明人: Amit Sinha

    IPC分类号: H04B17/00 H04Q7/20

    CPC分类号: H04W16/10 H04W12/12

    摘要: Systems and methods for using wireless radios for spectral analysis. Systems and methods include using wireless radios that are included in wireless devices communicating on the wireless network to perform a spectral scan of frequencies on a wireless network.

    摘要翻译: 使用无线电进行光谱分析的系统和方法。 系统和方法包括使用无线设备中包括的在无线网络上通信的无线电,以对无线网络上的频率执行频谱扫描。