METHOD AND SYSTEM FOR CLASSIFYING ARTICLE
    1.
    发明申请
    METHOD AND SYSTEM FOR CLASSIFYING ARTICLE 审中-公开
    用于分类文章的方法和系统

    公开(公告)号:US20130166558A1

    公开(公告)日:2013-06-27

    申请号:US13549759

    申请日:2012-07-16

    CPC classification number: G06F16/353

    Abstract: The present invention discloses a method and system for classifying articles. The present invention can be not only capable of distinguishing the type of the article but also novelty to generate an overview article automatically in accordance with the initial prepared keyword combination or articles. Furthermore, the overview article described above comprises a representative topic corresponding to the content of the initial prepared articles, wherein the representative topic is also able to identify the field of the articles. Accordingly, by the said overview article, the present invention is capable of decreasing the time required to understand the spirit and the technical aspect of the articles so as to solve the long lasted problem of the prior art.

    Abstract translation: 本发明公开了一种分类物品的方法和系统。 本发明不仅能够区分物品的类型,而且能够根据初始准备的关键字组合或物品自动地产生概要文章的新颖性。 此外,上述概述文章包括与初始准备文章的内容相对应的代表性主题,其中代表主题还能够识别文章的领域。 因此,通过所述概述文章,本发明能够减少理解物品的精神和技术方面所需的时间,以解决现有技术的长期存在的问题。

    Network attack detection devices and methods
    2.
    发明授权
    Network attack detection devices and methods 有权
    网络攻击检测设备和方法

    公开(公告)号:US08341742B2

    公开(公告)日:2012-12-25

    申请号:US12837986

    申请日:2010-07-16

    CPC classification number: H04L63/1416 H04L29/12066 H04L61/1511

    Abstract: A network attack detection device is provided, including a spatial coordinate database for storing spatial coordinate data; a standard time zone database for storing standard time zone data; a domain name system packet collector for collecting a domain name system packet; a spatial snapshot feature extractor for extracting internet protocol address corresponding to the domain name system packet according to the domain name system packet, and generating spatial feature data corresponding to the internet protocol address according to the internet protocol address, the spatial coordinate data and the standard time zone data; and an attack detector for determining whether the domain name system packet is an attack according to the spatial feature data and a spatial snapshot detection model, and when determining that the domain name system packet is an attack, sending a warning to indicate the attack.

    Abstract translation: 提供一种网络攻击检测装置,包括用于存储空间坐标数据的空间坐标数据库; 用于存储标准时区数据的标准时区数据库; 用于收集域名系统包的域名系统包收集器; 空间快照特征提取器,用于根据域名系统分组提取与域名系统分组对应的互联网协议地址,并根据因特网协议地址,空间坐标数据和标准产生与互联网协议地址对应的空间特征数据 时区数据; 以及用于根据空间特征数据和空间快照检测模型来确定域名系统分组是否是攻击的攻击检测器,并且当确定域名系统分组是攻击时,发送指示攻击的警告。

    Botnet early detection using hybrid hidden markov model algorithm
    3.
    发明授权
    Botnet early detection using hybrid hidden markov model algorithm 有权
    僵尸网络早期检测使用混合隐马尔可夫模型算法

    公开(公告)号:US08307459B2

    公开(公告)日:2012-11-06

    申请号:US12726272

    申请日:2010-03-17

    CPC classification number: H04L63/1441 H04L2463/144

    Abstract: A botnet detection system is provided. A bursty feature extractor receives an Internet Relay Chat (IRC) packet value from a detection object network, and determines a bursty feature accordingly. A Hybrid Hidden Markov Model (HHMM) parameter estimator determines probability parameters for a Hybrid Hidden Markov Model according to the bursty feature. A traffic profile generator establishes a probability sequential model for the Hybrid Hidden Markov Model according to the probability parameters and pre-defined network traffic categories. A dubious state detector determines a traffic state corresponding to a network relaying the IRC packet in response to reception of a new IRC packet, determines whether the IRC packet flow of the object network is dubious by applying the bursty feature to the probability sequential model for the Hybrid Hidden Markov Model, and generates a warning signal when the IRC packet flow is regarded as having a dubious traffic state.

    Abstract translation: 提供僵尸网络检测系统。 突发特征提取器从检测对象网络接收因特网中继聊天(IRC)分组值,并相应地确定突发特征。 混合隐马尔可夫模型(HHMM)参数估计器根据突发特征确定混合隐马尔可夫模型的概率参数。 流量简档生成器根据概率参数和预定义的网络流量类别建立混合隐马尔可夫模型的概率序列模型。 可疑状态检测器响应于接收到新的IRC分组而确定与中继IRC分组的网络相对应的业务状态,通过将突发特征应用于概率序列模型来确定对象网络的IRC分组流是否可疑, 混合隐马尔可夫模型,并且当IRC分组流被认为具有可疑业务状态时,生成警告信号。

    CONFLICT OF INTEREST DETECTION SYSTEM AND METHOD USING SOCIAL INTERACTION MODELS
    5.
    发明申请
    CONFLICT OF INTEREST DETECTION SYSTEM AND METHOD USING SOCIAL INTERACTION MODELS 审中-公开
    利益关系系统的冲突和使用社会互动模型的方法

    公开(公告)号:US20110173187A1

    公开(公告)日:2011-07-14

    申请号:US12850597

    申请日:2010-08-04

    CPC classification number: G06F17/2745 G06F16/35 G06F17/2785

    Abstract: A conflict of interest detection system is provided. A data extractor retrieves a document and extracts author, title, and date information. A co-authorship finder finds out co-author relation among documents. A relevant group cluster identifies a key researcher in a particular field, and groups researchers connected to the key researcher as a group. A potential link finder identifies researchers who may have co-author relation. A relation filter filters out couples having weaker relation from the group having co-author relation. The filtered co-author relation data is then stored as a conflict of interest list.

    Abstract translation: 提供利益冲突检测系统。 数据提取器检索文档并提取作者,标题和日期信息。 共同作者查找者发现文件之间的共同作者关系。 相关组群确定了一个特定领域的重点研究员,并将研究人员与关键研究人员联系起来。 潜在的链接查找器识别可能具有共同作者关系的研究人员。 关系滤波器滤除与具有共同作者关系的组具有较弱关系的夫妻。 然后将经筛选的共同作者关系数据作为利益冲突列表存储。

    CITATION RECORD EXTRACTION SYSTEM AND METHOD, AND PROGRAM PRODUCT
    6.
    发明申请
    CITATION RECORD EXTRACTION SYSTEM AND METHOD, AND PROGRAM PRODUCT 有权
    引用记录提取系统和方法以及程序产品

    公开(公告)号:US20110029528A1

    公开(公告)日:2011-02-03

    申请号:US12834757

    申请日:2010-07-12

    CPC classification number: G06F17/2241

    Abstract: A citation record extraction system is provided. An HTML rendering engine receives a publication list web page, parses the publication list web page to obtain layout information of the web page. A web page sequence builder generates a web page characteristic sequence for the web page according to the layout information. A web page repeated pattern analyzer analyzes repeated pattern presented in the web page characteristic sequence, screens out non-citation record therefrom, and obtains a citation record of the publication list web page.

    Abstract translation: 提供引文记录提取系统。 HTML呈现引擎接收发布列表网页,解析发布列表网页以获取网页的布局信息。 网页序列构建器根据布局信息生成网页的网页特征序列。 网页重复模式分析器分析网页特征序列中呈现的重复模式,从其中屏蔽非引用记录,并获得发布列表网页的引用记录。

    Method for generating cross-site scripting attack
    7.
    发明授权
    Method for generating cross-site scripting attack 有权
    生成跨站点脚本攻击的方法

    公开(公告)号:US08505080B2

    公开(公告)日:2013-08-06

    申请号:US13298295

    申请日:2011-11-17

    CPC classification number: H04L63/1466 H04L63/1433

    Abstract: A method for generating a cross-site scripting attack is provided. An attack string sample is analyzed for obtaining a token sequence. A string word corresponding to each token is used to replace the token for generating a cross-site scripting attack string. Accordingly, a large number of cross-site scripting attacks are generated automatically, so as to execute a penetration test for a website.

    Abstract translation: 提供了一种生成跨站点脚本攻击的方法。 分析攻击字符串样本以获得令牌序列。 对应于每个令牌的字符串字用于替换用于生成跨站点脚本攻击字符串的令牌。 因此,自动生成大量的跨站点脚本攻击,以便对网站执行渗透测试。

    Citation record extraction system and method
    8.
    发明授权
    Citation record extraction system and method 有权
    引文记录提取系统及方法

    公开(公告)号:US08429520B2

    公开(公告)日:2013-04-23

    申请号:US12834757

    申请日:2010-07-12

    CPC classification number: G06F17/2241

    Abstract: A citation record extraction system is provided for extracting citation records from publication list pages having different layouts and contents. An HTML rendering engine receives a publication list web page, parses the publication list web page to obtain layout information of the web page. A web page sequence builder generates a web page characteristic sequence for the web page according to the layout information. A web page repeated pattern analyzer analyzes repeated patterns presented in the web page characteristic sequence, screens out non-citation records therefrom, and obtains a citation record of the publication list web page.

    Abstract translation: 提供引文记录提取系统,用于从具有不同布局和内容的出版物列表页面中提取引文记录。 HTML呈现引擎接收发布列表网页,解析发布列表网页以获取网页的布局信息。 网页序列构建器根据布局信息生成网页的网页特征序列。 网页重复模式分析器分析网页特征序列中呈现的重复模式,从其中屏蔽非引用记录,并获得发布列表网页的引用记录。

    METHOD AND SYSTEM FOR DETECTING MALICIOUS SCRIPT
    9.
    发明申请
    METHOD AND SYSTEM FOR DETECTING MALICIOUS SCRIPT 审中-公开
    检测恶性症状的方法和系统

    公开(公告)号:US20120159629A1

    公开(公告)日:2012-06-21

    申请号:US13165787

    申请日:2011-06-21

    CPC classification number: G06F21/566 G06F2221/2105 H04L63/1416 H04L63/168

    Abstract: A method for detecting a malicious script is provided. A plurality of distribution eigenvalues are generated according to a plurality of function names of a web script. After the distribution eigenvalues are inputted to a hidden markov model (HMM), probabilities respectively corresponding to a normal state and an abnormal state are calculated. Accordingly, whether the web script is malicious or not can be determined according to the probabilities. Even an attacker attempts to change the event order, insert a new event or replace an event with a new one to avoid detection, the method can still recognize the intent hidden in the web script by using the HMM for event modeling. As such, the method may be applied in detection of obfuscated malicious scripts.

    Abstract translation: 提供了一种用于检测恶意脚本的方法。 根据web脚本的多个功能名称生成多个分布特征值。 在将分布特征值输入到隐马尔可夫模型(HMM)之后,计算分别对应于正常状态和异常状态的概率。 因此,可以根据概率来确定web脚本是否是恶意的。 即使攻击者也尝试更改事件顺序,插入新事件或替换事件以避免检测,该方法仍然可以通过使用HMM进行事件建模来识别隐藏在Web脚本中的意图。 因此,该方法可以应用于检测模糊的恶意脚本。

    DETECTION METHODS AND DEVICES OF WEB MIMICRY ATTACKS
    10.
    发明申请
    DETECTION METHODS AND DEVICES OF WEB MIMICRY ATTACKS 审中-公开
    WEB MIMICRY攻击的检测方法和设备

    公开(公告)号:US20110185420A1

    公开(公告)日:2011-07-28

    申请号:US12820564

    申请日:2010-06-22

    CPC classification number: H04L63/1416 G06F21/31 H04L63/168

    Abstract: A web mimicry attack detection device is provided, including: a first token sequence collector receiving a hypertext transfer protocol request and extracting string content of the hypertext transfer protocol request according to a token collection method to generate a token sequence corresponding to the hypertext transfer protocol request, wherein the token sequence comprises a plurality of the tokens; and a mimicry attack detector generating a label and a confidence score corresponding individually to the tokens according to the tokens and a conditional random field probability model, summing the confidence score individually corresponding to the tokens in the token sequence by a summary rule to generate a summary confidence score, and determining whether the hypertext transfer protocol request is an attack according to the summary confidence score and the label individually corresponding to the tokens.

    Abstract translation: 提供一种网络模拟攻击检测装置,包括:第一令牌序列收集器,接收超文本传输​​协议请求,并根据令牌收集方法提取超文本传输​​协议请求的字符串内容,以生成与超文本传输​​协议请求对应的令牌序列 ,其中所述令牌序列包括多个所述令牌; 以及模拟攻击检测器,其根据所述令牌和条件随机场概率模型,生成与所述令牌单独对应的标签和置信度分数,所述随机场概率模型通过总结规则将令牌序列中的所述令牌各自对应的置信度得分相加,以生成摘要 置信度得分,以及根据总结置信度得分和单独对应于令牌的标签来确定超文本传输​​协议请求是否是攻击。

Patent Agency Ranking