Systems and methods for determining authorship of an unclassified notification message
    71.
    发明授权
    Systems and methods for determining authorship of an unclassified notification message 有权
    用于确定未分类通知消息的作者身份的系统和方法

    公开(公告)号:US08935154B1

    公开(公告)日:2015-01-13

    申请号:US13446081

    申请日:2012-04-13

    IPC分类号: G06F17/27

    CPC分类号: G06F17/27

    摘要: A computer-implemented method for determining authorship of an unclassified notification message is described. An unclassified notification message with one or more target sentences is received. A message model based on one or more classified notification messages stored in a data storage device is retrieved. One or more linguistic analysis procedures are performed on the one or more target sentences. Results of the one or more linguistic analysis procedures are compared with one or more characteristics of the message model. The unclassified notification message is classified based on the results of the comparison.

    摘要翻译: 描述了一种用于确定未分类通知消息的作者身份的计算机实现的方法。 收到具有一个或多个目标句子的未分类通知消息。 检索基于存储在数据存储设备中的一个或多个分类通知消息的消息模型。 对一个或多个目标句子执行一个或多个语言分析程序。 将一个或多个语言分析程序的结果与消息模型的一个或多个特征进行比较。 未分类的通知消息根据比较结果进行分类。

    Evaluating relying parties
    72.
    发明授权
    Evaluating relying parties 有权
    评估依赖方

    公开(公告)号:US08887273B1

    公开(公告)日:2014-11-11

    申请号:US12884870

    申请日:2010-09-17

    IPC分类号: G06F11/00

    摘要: Determining reputation information is disclosed. A honey token is included in an online identity data. The honey token is to monitor for misuse of all or part of the online identity data. Optionally, information associated with at least one use of the honey token is aggregated with other reputation information.

    摘要翻译: 公开了确定信誉信息。 蜂蜜令牌包含在线身份数据中。 蜂蜜令牌是监控滥用全部或部分在线身份数据。 可选地,与蜂蜜令牌的至少一个使用相关联的信息与其他信誉信息进行聚合。

    Method and apparatus for providing identity claim validation
    73.
    发明授权
    Method and apparatus for providing identity claim validation 有权
    用于提供身份声明验证的方法和装置

    公开(公告)号:US08788836B1

    公开(公告)日:2014-07-22

    申请号:US11644579

    申请日:2006-12-22

    IPC分类号: G06F21/00

    摘要: A method and apparatus for providing claim validation without storing user information within the IDM system. During enrollment, the IDM system creates a hash representative of the identification information provided by a user. The user information is discarded, i.e., not stored within the IDM system. Only a hash representing that information is stored within the system. Upon a user providing information to a service provider, the service provider requests that the user's information be authenticated by a third party IDS system. The service provider will request such authentication from the IDM system identified by the user. The IDM system generates, from the user's information that was provided to the service provider, a signed token that is sent to the user for use by the user to access the service provider's services. In this manner, the IDM system does not store identification information of the user. Yet, the IDM system provides identification validation services to any service provider requesting such services to ensure that a user is authentic.

    摘要翻译: 一种用于提供权利要求验证而不在IDM系统内存储用户信息的方法和装置。 在注册期间,IDM系统创建由用户提供的识别信息的哈希表示。 用户信息被丢弃,即不存储在IDM系统内。 只有表示该信息的哈希存储在系统中。 当用户向服务提供商提供信息时,服务提供商请求用户的信息由第三方IDS系统认证。 服务提供商将从用户识别的IDM系统请求此类认证。 IDM系统从提供给服务提供商的用户的信息中生成发送给用户以供用户访问服务提供商的服务的签名令牌。 以这种方式,IDM系统不存储用户的识别信息。 然而,IDM系统向请求这样的服务的任何服务提供商提供识别验证服务,以确保用户是真实的。

    Endpoint management using trust rating data
    74.
    发明授权
    Endpoint management using trust rating data 有权
    端点管理使用信任评级数据

    公开(公告)号:US08763076B1

    公开(公告)日:2014-06-24

    申请号:US13488419

    申请日:2012-06-04

    IPC分类号: H04L29/06

    摘要: Techniques are disclosed for implementing dynamic endpoint management. In accordance with one embodiment, whenever an endpoint joins a managed network for the first time, or rejoins that network, a local security module submits a list of applications (e.g., all or incremental) to a security server. The server validates the list and sends back a rule set (e.g., allow/block rules and/or required application security settings) for those applications. If the server has no information for a given application, it may further subscribe to content from a content provider or service. When the server is queried regarding an unknown application, the server sends a query to the service provider to obtain a trust rating for that unknown application. The trust rating can then be used to generate a rule set for the unknown application. Functionality can be shifted from server to client, and vice-versa if so desired.

    摘要翻译: 公开了实现动态端点管理的技术。 根据一个实施例,每当端点首次加入受管网络或重新加入该网络时,本地安全模块将应用列表(例如全部或增量)提交给安全服务器。 服务器验证列表,并发送这些应用程序的规则集(例如,允许/阻止规则和/或必需的应用程序安全设置)。 如果服务器没有给定应用程序的信息,它可以进一步订阅来自内容提供商或服务的内容。 当服务器查询未知应用程序时,服务器向服务提供商发送查询以获得该未知应用程序的信任等级。 然后可以使用信任评级来为未知应用程序生成规则集。 如果需要,功能可以从服务器转移到客户端,反之亦然。

    Methods and systems for processing web content encoded with malicious code
    75.
    发明授权
    Methods and systems for processing web content encoded with malicious code 有权
    处理使用恶意代码编码的网页内容的方法和系统

    公开(公告)号:US08745742B1

    公开(公告)日:2014-06-03

    申请号:US12264101

    申请日:2008-11-03

    IPC分类号: G06F12/14 G06F7/00 G06F17/30

    摘要: A computer-implemented method for processing web content may comprise receiving web content encoded with malicious steganographic code. Before presenting the web content, the method may comprise modifying the web content to create modified content such that information conveyed by the malicious steganographic code is at least partially corrupted in the modified content. Additionally, a functionality of the modified content may be at least substantially similar to a functionality of the web content following modification of the web content to create the modified content. Various other methods, computer-readable media, and systems are also disclosed.

    摘要翻译: 用于处理网页内容的计算机实现的方法可以包括接收用恶意隐写代码编码的网络内容。 在呈现网络内容之前,该方法可以包括修改网络内容以创建修改的内容,使得恶意隐身代码传达的信息在修改的内容中至少部分地被破坏。 此外,修改的内容的功能可以至少基本上类似于web内容的修改之后的web内容的功能,以创建修改的内容。 还公开了各种其它方法,计算机可读介质和系统。

    Methods and systems for enabling community-tested security features for legacy applications
    76.
    发明授权
    Methods and systems for enabling community-tested security features for legacy applications 有权
    用于实现遗留应用程序的社区测试安全功能的方法和系统

    公开(公告)号:US08713687B2

    公开(公告)日:2014-04-29

    申请号:US12336668

    申请日:2008-12-17

    IPC分类号: G06F7/04 G06F21/12

    摘要: A computer-implemented method for enabling community-tested security features for legacy applications may include: 1) identifying a plurality of client systems, 2) identifying a legacy application on a client system within the plurality of client systems, 3) identifying a security-feature-enablement rule for the legacy application, 4) enabling at least one security feature for the legacy application by executing the security-feature-enablement rule, 5) determining the impact of the security-feature-enablement rule on the health of the legacy application, and then 6) relaying the impact of the security-feature-enablement rule on the health of the legacy application to a server. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于实现遗留应用的经社区测试的安全特征的计算机实现的方法可以包括:1)识别多个客户端系统,2)识别多个客户端系统内的客户端系统上的遗留应用; 3) 用于遗留应用的特征启用规则,4)通过执行安全特征启用规则来为遗留应用启用至少一个安全特征,5)确定安全特征使能规则对遗产的健康的影响 应用程序,然后6)将安全功能启用规则的影响中继到传统应用程序的运行状况到服务器。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for user-specific tuning of classification heuristics
    77.
    发明授权
    Systems and methods for user-specific tuning of classification heuristics 有权
    用于用户特定调整分类启发式的系统和方法

    公开(公告)号:US08626675B1

    公开(公告)日:2014-01-07

    申请号:US12559943

    申请日:2009-09-15

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    IPC分类号: G06F15/18

    CPC分类号: G06N5/003 G06N5/00

    摘要: A computer-implemented method for user-specific tuning of classification heuristics may include: 1) identifying a trusted software component on the computing device that has been excluded from analysis by a classification heuristic, 2) applying the classification heuristic to the trusted software component, 3) determining that the classification heuristic incorrectly classified the trusted software component, and then 4) lowering a confidence score associated with the classification heuristic.

    摘要翻译: 用于用户特定的分类启发式调谐的计算机实现方法可以包括:1)通过分类启发式来识别已经从分析排除的计算设备上的可信软件组件,2)将分类启发式应用于可信软件组件, 3)确定分类启发式错误地分类可信软件组件,然后4)降低与分类启发式相关联的置信度分数。

    Detecting malware through package behavior
    78.
    发明授权
    Detecting malware through package behavior 有权
    通过包行为检测恶意软件

    公开(公告)号:US08499350B1

    公开(公告)日:2013-07-30

    申请号:US12511885

    申请日:2009-07-29

    申请人: Sourabh Satish

    发明人: Sourabh Satish

    CPC分类号: G06F21/566

    摘要: A file on a computer system is evaluated against trust criteria to determine whether the file is compatible with the trust criteria. Responsive to the file being incompatible with the trust criteria, the file is assigned to a package. Files assigned to the package are tracked to determine whether the files collectively perform malicious behavior. The package is convicted as malware responsive to the files in the package collectively performing malicious behavior.

    摘要翻译: 根据信任条件对计算机系统上的文件进行评估,以确定文件是否与信任条件兼容。 响应于与信任条件不兼容的文件,该文件被分配给一个包。 跟踪分配给包的文件,以确定文件是否集体执行恶意行为。 该软件包被定罪为恶意软件,响应包中的文件,共同执行恶意行为。

    Methods and systems for detecting rootkits
    79.
    发明授权
    Methods and systems for detecting rootkits 有权
    用于检测rootkit的方法和系统

    公开(公告)号:US08353058B1

    公开(公告)日:2013-01-08

    申请号:US12410166

    申请日:2009-03-24

    摘要: A computer-implemented method for detecting rootkits is disclosed. The computer-implemented method may include sending periodic security communications from a privileged-processor-mode region of a computing device. The computer-implemented method may also include identifying at least one of the periodic security communications. The computer-implemented method may further include determining, based on the periodic security communications, whether the privileged-processor-mode region of the computing device has been compromised. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 公开了一种用于检测rootkit的计算机实现方法。 计算机实现的方法可以包括从计算设备的特权处理器模式区域发送周期性安全通信。 计算机实现的方法还可以包括识别周期性安全通信中的至少一个。 计算机实现的方法还可以包括基于周期性安全通信来确定计算设备的特权处理器模式区域是否已被破坏。 还公开了各种其它方法,系统和计算机可读介质。

    Determining firewall rules for an application on a client based on firewall rules and reputations of other clients
    80.
    发明授权
    Determining firewall rules for an application on a client based on firewall rules and reputations of other clients 有权
    基于防火墙规则和其他客户端的声誉,确定客户端上的应用程序的防火墙规则

    公开(公告)号:US08353021B1

    公开(公告)日:2013-01-08

    申请号:US12242625

    申请日:2008-09-30

    IPC分类号: H04L29/06

    CPC分类号: H04L63/0263 H04L63/0218

    摘要: A security system monitors the trustworthiness and firewall configurations of a set of clients, where a firewall configuration comprises a set of firewall rules that control access by an application to network communication functionalities of a client. Based on the firewall rules used by other clients and the reputation of those clients, the system determines a set of default firewall rules by selecting one or more rules that are used by the more trustworthy clients. The default firewall rules are made available to other clients, which may use these default rules. This leverages community knowledge about how much network access to allow for a particular application.

    摘要翻译: 安全系统监视一组客户机的可信赖性和防火墙配置,其中防火墙配置包括控制应用程序对客户端的网络通信功能的访问的一组防​​火墙规则。 根据其他客户端使用的防火墙规则和这些客户端的声誉,系统通过选择一个或多个更可信赖的客户端使用的规则来确定一组默认防火墙规则。 默认防火墙规则对其他客户端可用,可能使用这些默认规则。 这有助于社区关于允许特定应用程序访问多少网络的知识。