System and method of managing network security risks
    1.
    发明授权
    System and method of managing network security risks 有权
    管理网络安全风险的系统和方法

    公开(公告)号:US08201257B1

    公开(公告)日:2012-06-12

    申请号:US10813917

    申请日:2004-03-31

    IPC分类号: G06F21/00

    CPC分类号: G06F21/56 G06F21/568

    摘要: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets. The security risk management system provides tools for performing preventive action and for tracking the success of preventive action.

    摘要翻译: 安全风险管理系统包括漏洞数据库,资产数据库,本地威胁情报数据库和威胁相关模块。 漏洞数据库包含有关使用主动或被动漏洞评估技术收集的网络上资产的安全漏洞的数据。 资产数据库包括有关每个资产属性的数据。 威胁相关模块接收威胁情报警报,识别与影响资产类别的安全威胁相关联的属性和漏洞。 威胁关联模块将资产属性和漏洞与威胁属性和漏洞进行比较,并显示受特定威胁影响的资产列表。 该列表可以根据计算的风险评分进行排序,从而允许管理员优先处理预防措施,并首先对影响更高风险资产的威胁做出回应。 安全风险管理系统为执行预防性行动和跟踪预防行动的成功提供了工具。

    TECHNIQUES TO COPY AN OPERATING SYSTEM
    2.
    发明申请
    TECHNIQUES TO COPY AN OPERATING SYSTEM 审中-公开
    复制操作系统的技术

    公开(公告)号:US20140207906A1

    公开(公告)日:2014-07-24

    申请号:US14097910

    申请日:2013-12-05

    IPC分类号: H04L29/08

    摘要: Techniques are described that can be used to enable a transfer of an operating system from one machine to another. The transfer permits the operating system to be available to the target machine at buffers that are accessible to one or more application or other logic. In some implementations, information related to an operating system migration is stored in a buffer that is accessible to an application that is to use the information and thereby avoids a copy of such information from an intermediate buffer to an application buffer.

    摘要翻译: 描述了可用于使操作系统从一台机器传输到另一台机器的技术。 该传输允许操作系统在可由一个或多个应用程序或其他逻辑访问的缓冲区处可用于目标机器。 在一些实现中,与操作系统迁移相关的信息被存储在可使用该信息的应用程序可访问的缓冲器中,从而避免将这种信息从中间缓冲器复制到应用缓冲器。

    Chipset feature detection and configuration by an I/O device
    3.
    发明申请
    Chipset feature detection and configuration by an I/O device 有权
    芯片组特征检测和I / O设备配置

    公开(公告)号:US20060136611A1

    公开(公告)日:2006-06-22

    申请号:US10750060

    申请日:2003-12-30

    IPC分类号: G06F13/28

    CPC分类号: G06F13/4027

    摘要: Apparatus and method for a first device to query a second device for the availability of a hardware feature within the second device, and for the second to receive and analyze the query to determine whether or not to respond, depending on the version of hardware feature sought, a code identifying a vendor, etc., and responding with a reply providing an indication of availability of the hardware feature and/or an address at which the hardware feature may be accessed, if the determination is made to reply.

    摘要翻译: 用于第一设备的第二设备查询第二设备内的硬件特征的可用性的装置和方法,以及第二设备接收和分析查询以确定是否响应,取决于所寻求的硬件特征的版本 ,识别供应商等的代码,并且如果确定作出回复,则响应提供硬件特征的可用性的指示和/或可以访问硬件特征的地址。

    Interrupt scheme for an input/output device
    4.
    发明申请
    Interrupt scheme for an input/output device 有权
    输入/输出设备的中断方案

    公开(公告)号:US20050228922A1

    公开(公告)日:2005-10-13

    申请号:US10816435

    申请日:2004-03-31

    IPC分类号: G06F9/46 G06F9/48 G06F13/24

    摘要: Provided are techniques for interrupt processing. An Input/Output device determines that an event has occurred. The Input/Output device determines a processor identifier and determines an event data structure identifier for an event data structure into which data for the event is stored using the processor identifier. The Input/Output device also determines a vector identifier for an interrupt message vector into which an interrupt message for the event is written. Then, interrupt message data is written to the interrupt message vector to generate an interrupt.

    摘要翻译: 提供了用于中断处理的技术。 输入/输出设备确定事件已发生。 输入/输出设备确定处理器标识符并且确定事件数据结构的事件数据结构标识符,使用处理器标识符存储事件的数据。 输入/输出设备还确定一个中断消息向量的向量标识符,其中写入事件的中断消息。 然后,将中断消息数据写入中断消息向量以产生中断。

    SYSTEM AND METHOD OF MANAGING NETWORK SECURITY RISKS
    9.
    发明申请
    SYSTEM AND METHOD OF MANAGING NETWORK SECURITY RISKS 审中-公开
    管理网络安全风险的系统和方法

    公开(公告)号:US20120185945A1

    公开(公告)日:2012-07-19

    申请号:US13432722

    申请日:2012-03-28

    IPC分类号: G06F21/00

    CPC分类号: G06F21/56 G06F21/568

    摘要: A security risk management system comprises a vulnerability database, an asset database, a local threat intelligence database and a threat correlation module. The vulnerability database comprises data about security vulnerabilities of assets on a network gathered using active or passive vulnerability assessment techniques. The asset database comprises data concerning attributes of each asset. The threat correlation module receives threat intelligence alerts that identify attributes and vulnerabilities associated with security threats that affect classes of assets. The threat correlation module compares asset attributes and vulnerabilities with threat attributes and vulnerabilities and displays a list of assets that are affected by a particular threat. The list can be sorted according to a calculated risk score, allowing an administrator to prioritize preventive action and respond first to threats that affect higher risk assets. The security risk management system provides tools for performing preventive action and for tracking the success of preventive action.

    摘要翻译: 安全风险管理系统包括漏洞数据库,资产数据库,本地威胁情报数据库和威胁相关模块。 漏洞数据库包含有关使用主动或被动漏洞评估技术收集的网络上资产的安全漏洞的数据。 资产数据库包括有关每个资产属性的数据。 威胁相关模块接收威胁情报警报,识别与影响资产类别的安全威胁相关联的属性和漏洞。 威胁关联模块将资产属性和漏洞与威胁属性和漏洞进行比较,并显示受特定威胁影响的资产列表。 该列表可以根据计算的风险评分进行排序,从而允许管理员优先处理预防措施,并首先对影响更高风险资产的威胁做出回应。 安全风险管理系统为执行预防性行动和跟踪预防行动的成功提供了工具。