Intrustion protection system utilizing layers and triggers
    1.
    发明申请
    Intrustion protection system utilizing layers and triggers 有权
    使用层和触发器的入侵保护系统

    公开(公告)号:US20050257266A1

    公开(公告)日:2005-11-17

    申请号:US11082194

    申请日:2005-03-16

    IPC分类号: G06F21/00 H04L9/00 H04L29/06

    摘要: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

    摘要翻译: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象受到保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。

    Intrustion protection system utilizing layers
    2.
    发明申请
    Intrustion protection system utilizing layers 有权
    入侵防护系统利用层

    公开(公告)号:US20050257265A1

    公开(公告)日:2005-11-17

    申请号:US11081856

    申请日:2005-03-16

    IPC分类号: G06F21/00 H04L9/00 H04L29/06

    摘要: The inventions relate generally to protection of computing systems by isolating intrusive attacks into layers, those layers containing at least file objects and being accessible to applications, those layers further maintaining potentially intrusive file objects separately from regular file system objects such that the regular objects are protected and undisturbed. Also disclosed herein are computing systems which use layers and/or isolation layers, and various systems and methods for using those systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.

    摘要翻译: 本发明一般涉及通过将入侵攻击隔离成层,这些层至少包含文件对象并且可被应用程序访问的那些层,这些层进一步将常规文件系统对象分开保留潜在的侵入性文件对象,使得常规对象被保护 并不受干扰。 本文还公开了使用层和/或隔离层的计算系统以及用于使用这些系统的各种系统和方法。 在下面的详细描述中提供了关于本发明的各种示例性实施例的详细信息,并且本发明由所附权利要求限定。