Methods and apparatus for detecting patterns in a data stream
    53.
    发明申请
    Methods and apparatus for detecting patterns in a data stream 有权
    用于检测数据流中的模式的方法和装置

    公开(公告)号:US20050135380A1

    公开(公告)日:2005-06-23

    申请号:US10744709

    申请日:2003-12-23

    CPC分类号: H04L63/1441 G06F17/2705

    摘要: In some embodiments, a method includes generating a prefix trie for a set of patterns, generating a suffix trie for the set of patterns, and establishing respective links between nodes of the prefix trie and respective corresponding nodes of the suffix trie. In some embodiments, a method includes adding a suffix to a suffix tree, so that the suffix (which is at least a portion of a pattern) is represented in the tree by a path that begins at a first node and ends at a second node, and associating with at least the first node and the second node a pattern identifier that identifies the pattern.

    摘要翻译: 在一些实施例中,一种方法包括为一组模式生成前缀特里,为该模式集合生成后缀特里,以及在前缀特里的节点和后缀特里的相应对应节点之间建立相应的链接。 在一些实施例中,一种方法包括向后缀树添加后缀,使得后缀(其是模式的至少一部分)在树中由在第一节点开始并在第二节点结束的路径来表示 并且至少与第一节点和第二节点相关联的是识别模式的模式标识符。

    Packet classification
    54.
    发明申请
    Packet classification 有权
    分组分类

    公开(公告)号:US20050135351A1

    公开(公告)日:2005-06-23

    申请号:US10740647

    申请日:2003-12-18

    摘要: An apparatus and method includes grouping filters to form a tree according to a bitmask. The bitmask includes entries indicating whether a value is assigned to an element of a filter. The method also includes receiving a packet that includes a particular bitmask, searching the tree to determine filters associated with the particular bitmask and the associated values, and returning a set of filters that are an intersection of the filters indicated by the associated values.

    摘要翻译: 一种装置和方法包括根据位掩码对滤波器进行分组以形成树。 位掩码包括指示是否将值分配给过滤器的元素的条目。 该方法还包括接收包括特定位掩码的分组,搜索该树以确定与特定位掩码和相关联的值相关联的过滤器,以及返回一组滤波器,该滤波器是由相关联的值指示的滤波器的相交。

    Full 3D interaction on mobile devices
    55.
    发明授权
    Full 3D interaction on mobile devices 有权
    在移动设备上进行全3D互动

    公开(公告)号:US09335888B2

    公开(公告)日:2016-05-10

    申请号:US13996088

    申请日:2011-12-27

    摘要: Systems and methods may provide for displaying a three-dimensional (3D) environment on a screen of a mobile device, and identifying a user interaction with an area behind the mobile device. In addition, the 3D environment can be modified based at least in part on the first user interaction. Moreover, the 3D environment may be modified based on movements of the mobile device as well as user interactions with the mobile device, allowing the user to navigate through the virtual 3D environment by moving the mobile/handheld device.

    摘要翻译: 系统和方法可以提供在移动设备的屏幕上显示三维(3D)环境,并且识别与移动设备后面区域的用户交互。 另外,可以至少部分地基于第一用户交互来修改3D环境。 此外,可以基于移动设备的移动以及用户与移动设备的交互来修改3D环境,从而允许用户通过移动移动/手持设备在虚拟3D环境中导航。

    Detection and reporting of virtualization malware in computer processor environments
    56.
    发明授权
    Detection and reporting of virtualization malware in computer processor environments 有权
    在计算机处理器环境中检测和报告虚拟化恶意软件

    公开(公告)号:US08417945B2

    公开(公告)日:2013-04-09

    申请号:US12165155

    申请日:2008-06-30

    IPC分类号: H04L29/06

    摘要: Methods and systems to detect virtualization of computer system resources, such as by malware, include methods and systems to evaluate information corresponding to a computer processor operating environment, outside of or secure from the operating environment, which may include one or more of a system management mode of operation and a management controller system. Information may include processor register values. Information may be obtained from within the operating environment, such as with a host application running within the operating environment. Information may be obtained outside of the operating environment, such as from a system state map. Information obtained from within the operating environment may be compared to corresponding information obtained outside of the operating environment. Direct memory address (DMA) translation information may be used to determine whether an operating environment is remapping DMA accesses. Page tables, interrupt tables, and segmentation tables may be used to reconstruct a view of linear memory corresponding to the operating environment, which may be scanned for malware or authorized code and data.

    摘要翻译: 检测诸如恶意软件的计算机系统资源的虚拟化的方法和系统包括评估与操作环境之外或安全的操作环境相对应的计算机处理器操作环境的信息的方法和系统,其可以包括一个或多个系统管理 操作模式和管理控制器系统。 信息可能包括处理器寄存器值。 可以在操作环境内获得信息,例如在操作环境中运行的主机应用程序。 信息可以在操作环境之外获取,例如从系统状态图。 从操作环境中获取的信息可以与在操作环境之外获得的相应信息进行比较。 可以使用直接存储器地址(DMA)转换信息来确定操作环境是否重映射DMA访问。 页表,中断表和分段表可以用于重构与操作环境相对应的线性存储器的视图,其可以扫描恶意软件或授权的代码和数据。

    GENERATING MULTIPLE ADDRESS SPACE IDENTIFIERS PER VIRTUAL MACHINE TO SWITCH BETWEEN PROTECTED MICRO-CONTEXTS
    57.
    发明申请
    GENERATING MULTIPLE ADDRESS SPACE IDENTIFIERS PER VIRTUAL MACHINE TO SWITCH BETWEEN PROTECTED MICRO-CONTEXTS 有权
    每个虚拟机产生多个地址空间识别器,以保护受保护的微控制器

    公开(公告)号:US20130036291A1

    公开(公告)日:2013-02-07

    申请号:US13650227

    申请日:2012-10-12

    IPC分类号: G06F12/10

    CPC分类号: G06F12/1027 G06F12/145

    摘要: Embodiments of an invention for generating multiple address space identifiers per virtual machine to switch between protected micro-contexts are disclosed. In one embodiment, a method includes receiving an instruction requiring an address translation; initiating, in response to receiving the instruction, a page walk from a page table pointed to by the contents of a page table pointer storage location; finding, during the page walk, a transition entry; storing the address translation and one of a plurality of address source identifiers in a translation lookaside buffer, the one of the plurality of address source identifiers based on one of a plurality of a virtual partition identifiers, at least two of the plurality of virtual partition identifiers associated with one of a plurality of virtual machines; and re-initiating the page walk.

    摘要翻译: 公开了用于在每个虚拟机之间生成多个地址空间标识符以在受保护的微上下文之间切换的发明的实施例。 在一个实施例中,一种方法包括接收需要地址转换的指令; 响应于接收到指令,从页表指针存储位置的内容指向的页表中启动页面移动; 在页面散步期间发现转换条目; 将地址转换和多个地址源标识符之一存储在转换后备缓冲器中,所述多个地址源标识符中的一个基于多个虚拟分区标识符中的一个,多个虚拟分区标识符中的至少两个 与多个虚拟机中的一个相关联; 并重新启动页面散步。

    Tamper protection of software agents operating in a vitual technology environment methods and apparatuses
    60.
    发明授权
    Tamper protection of software agents operating in a vitual technology environment methods and apparatuses 失效
    软件代理商的篡改保护在操作技术环境中的方法和设备

    公开(公告)号:US07882318B2

    公开(公告)日:2011-02-01

    申请号:US11529828

    申请日:2006-09-29

    IPC分类号: G06F13/10

    摘要: Methods, apparatuses, articles, and systems for comparing a first security domain of a first memory page of a physical device to a second security domain of a second memory page of the physical device, the security domains being stored in one or more registers of a processor of the physical device, are described herein. Based on the comparison, the processor disallows an instruction from the first memory page to access the second memory page if the first security domain is different from the second security domain. Resultantly, software agents, in particular, critical software agents, may be protected in a virtual technology (VT) environment more efficiently and effectively.

    摘要翻译: 用于将物理设备的第一存储器页面的第一安全域与物理设备的第二存储器页面的第二安全域进行比较的方法,设备,文章和系统,所述安全域被存储在物理设备的一个或多个寄存器中 物理设备的处理器。 基于比较,如果第一安全域与第二安全域不同,则处理器不允许来自第一存储器页的指令访问第二存储器页。 因此,软件代理,特别是关键软件代理,可以在虚拟技术(VT)环境中更有效和更有效地得到保护。