Identifying computer users having files with common attributes
    3.
    发明授权
    Identifying computer users having files with common attributes 有权
    识别具有共同属性的文件的计算机用户

    公开(公告)号:US08768893B2

    公开(公告)日:2014-07-01

    申请号:US13296431

    申请日:2011-11-15

    CPC classification number: G06F17/30613 G06F17/30699

    Abstract: A method includes generating a first table having a set of attributes for each file in a first set of files associated with a first computer user. The set of attributes for each file in the first set of files have a plurality of attribute types. The method further includes generating a second table having a set of attributes for each file in a second set of files associated with a second computer user. The set of attributes for each file in the second set of files have the plurality of attribute types. The method further includes generating a similarity table by comparing each set of attributes in the first table with each set of attributes in the second table, utilizing a predetermined similarity metric, and determining whether the first and second computer users have at least one file with common attributes, based on data in the similarity table.

    Abstract translation: 一种方法包括生成具有与第一计算机用户相关联的第一组文件中的每个文件的一组属性的第一表格。 第一组文件中的每个文件的属性集具有多个属性类型。 该方法还包括生成具有与第二计算机用户相关联的第二组文件中的每个文件的一组属性的第二表。 第二组文件中的每个文件的属性集具有多个属性类型。 该方法还包括通过将第一表中的每个属性集合与第二表中的每组属性进行比较,利用预定的相似性度量来生成相似性表,以及确定第一和第二计算机用户是否具有至少一个具有共同的文件 属性,基于相似度表中的数据。

    System and Method for Detecting Behavior Anomaly in Information Access
    5.
    发明申请
    System and Method for Detecting Behavior Anomaly in Information Access 有权
    用于检测信息访问行为异常的系统和方法

    公开(公告)号:US20140059686A1

    公开(公告)日:2014-02-27

    申请号:US14063714

    申请日:2013-10-25

    Abstract: A system and method for identifying anomalies in information requests. The information requests are modeled into a plurality of basic elements and association among the basic elements are tracked. The association of one information request is compared with a plurality of bitmap tables and counters representing a baseline information from a historical behavior information. If the association of this information request differs from the baseline information, an alert is issued. The system responds dynamically to changing baselines in assessment of which behaviors constitute an anomaly.

    Abstract translation: 用于识别信息请求中的异常的系统和方法。 信息请求被建模为多个基本元素,并且跟踪基本元素之间的关联。 将一个信息请求的关联与表示来自历史行为信息的基准信息的多个位图表和计数器进行比较。 如果该信息请求的关联与基准信息不同,则发出警报。 系统对变化的基线进行动态响应,评估哪些行为构成异常。

    System and method for information risk management
    7.
    发明授权
    System and method for information risk management 有权
    信息风险管理系统和方法

    公开(公告)号:US08631081B2

    公开(公告)日:2014-01-14

    申请号:US12497981

    申请日:2009-07-06

    Abstract: The present invention provides a system and method for evaluating risk associated with information access requests. The information access requests are collected, assigned a risk level according to user defined policies, a total risk is calculated and presented to user. The user can select a high risk event for further analysis. The system will break down the event into basic elements, so the user can ascertain the risk. The system allows a user to customize a report and the customized report can be saved as a template for future use.

    Abstract translation: 本发明提供了一种用于评估与信息访问请求相关联的风险的系统和方法。 收集信息访问请求,根据用户定义的策略分配风险级别,计算总体风险并呈现给用户。 用户可以选择高风险事件进行进一步分析。 系统将事件分解为基本元素,因此用户可以确定风险。 该系统允许用户自定义报告,并且自定义报告可以保存为模板以备将来使用。

    Method for Adaptively Building a Baseline Behavior Model
    8.
    发明申请
    Method for Adaptively Building a Baseline Behavior Model 有权
    自适应构建基线行为模型的方法

    公开(公告)号:US20130080631A1

    公开(公告)日:2013-03-28

    申请号:US13683639

    申请日:2012-11-21

    Abstract: A method for generating an auto-adaptive baseline model for profiling individual and collective behavior of a plurality of network users. The method comprises the steps of creating a model, defining a plurality of members and a plurality of collective variables, each member corresponding to a user, and including a plurality of individual variables, defining conditions for each collective variable and individual variable, upon detecting an activity by a user, updating corresponding individual variables and collective variables, and comparing updated individual variables and collective variables against corresponding conditions. If a condition is met, an alert event is issued to notify designated personnel; otherwise, returning to the step of upon detecting activity. Finally, upon receiving an alert event, the designated personnel decides whether to manually redefine the conditions or to ignore the alert event. If the alert event is ignored, said conditions are automatically redefined in accordance with system defined mechanisms.

    Abstract translation: 一种用于生成用于分析多个网络用户的个体和集体行为的自适应基线模型的方法。 该方法包括以下步骤:在检测到所述模型,定义多个成员和多个集合变量,每个成员对应于用户,并且包括多个单独变量,为每个集体变量和各个变量定义条件 用户的活动,更新相应的单个变量和集体变量,以及将更新的单个变量和集合变量与相应条件进行比较。 如果符合条件,则发出警报事件通知指定人员; 否则,返回到检测活动的步骤。 最后,在接收到警报事件后,指定的人员决定是手动重新定义条件还是忽略警报事件。 如果忽略警报事件,则会根据系统定义的机制自动重新定义所述条件。

    Tunnel designation system for virtual private networks
    9.
    发明授权
    Tunnel designation system for virtual private networks 有权
    虚拟专用网络隧道指定系统

    公开(公告)号:US07882558B1

    公开(公告)日:2011-02-01

    申请号:US11542680

    申请日:2006-10-02

    CPC classification number: H04L12/4641 H04L63/0272 H04L2212/00

    Abstract: A system and method are provided to couple tunnel servers to tunnel clients executing host applications for use in a virtual private network (VPN) environment. A receiver receives requests from host applications executing on the tunnel clients. The requests are addressed to the tunnel coupling system to establish a VPN tunnel. A processor processes the requests and an indication of loads on the tunnel servers to establish the VPN tunnels by designating at least one of the tunnel servers to each requested tunnel. A tunnel traffic distributor distributes tunnel traffic to the tunnel servers based at least part on the designations. In additional aspects, an evaluation processor evaluates the tunnel traffic before the tunnel traffic distributor distributes the tunnel traffic to the tunnel servers. For example, the evaluation performed by the evaluation processor includes at least performing security functions on the tunnel traffic. In yet another aspect, the request processor establishes the VPN tunnel by, in part, associating each VPN tunnel with characteristics of tunnel traffic for that VPN tunnel, and the tunnel traffic distributor operates in part based on the associations, without involvement of the host applications.

    Abstract translation: 提供了一种系统和方法来将隧道服务器耦合到执行主机应用程序的隧道客户端以在虚拟专用网络(VPN)环境中使用。 接收器接收来自在隧道客户端上执行的主机应用程序的请求。 这些请求被发送到隧道耦合系统以建立VPN隧道。 处理器处理请求以及隧道服务器上的负载指示,以通过将至少一个隧道服务器指定给每个请求的隧道来建立VPN隧道。 隧道流量分配器至少部分地根据指定将隧道流量分配给隧道服务器。 在另外的方面,评估处理器评估在隧道流量分配器向隧道服务器分配隧道流量之前的隧道流量。 例如,由评估处理器执行的评估至少包括对隧道业务执行安全功能。 在另一方面,请求处理器通过部分地将每个VPN隧道与该VPN隧道的隧道流量的特性相关联来建立VPN隧道,并且隧道业务分配器基于关联而部分地运行,而不涉及主机应用 。

Patent Agency Ranking