Methods and apparatus for dealing with malware
    1.
    发明授权
    Methods and apparatus for dealing with malware 有权
    用于处理恶意软件的方法和设备

    公开(公告)号:US08726389B2

    公开(公告)日:2014-05-13

    申请号:US13543866

    申请日:2012-07-08

    CPC分类号: G06F21/56 G06F21/577

    摘要: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

    摘要翻译: 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。

    Tubular belt conveyor system
    2.
    发明授权
    Tubular belt conveyor system 失效
    管状皮带输送机系统

    公开(公告)号:US5161675A

    公开(公告)日:1992-11-10

    申请号:US368341

    申请日:1989-06-09

    摘要: A tubular belt conveyor system includes a conveyor belt having a cross-sectionally closed, curvilinear, tubular configuration including a zone of overlapping edge portions. A plurality of support and guide assemblies for the conveyor are situated along the conveyor path. Each assembly includes a plurality of support and guide rollers held about the cross-sectionally closed conveyor belt in a contacting relationship therewith. In each assembly one roller is in engagement with the cross-sectionally closed conveyor belt at the edge overlap. The closed tubular configuration in each length portion of the conveying path has an oval cross section. The support and guide rollers force the conveyor belt into the closed tubular configuration of oval cross section. The first support and guide roller of each assembly is settable onto the zone of overlapping edge portions.

    摘要翻译: PCT No.PCT / EP87 / 00766 Sec。 371日期1989年6月9日第 102(e)日期1989年6月9日PCT提交1987年12月9日PCT公布。 出版物WO88 / 04269 日期:1988年6月16日。一种管状带式输送机系统包括具有横截面闭合的曲线形管状构造的输送带,该管状结构包括重叠边缘部分的区域。 输送机的多个支撑和导向组件沿传送路径设置。 每个组件包括以与其接触的关系围绕横截面封闭的传送带保持的多个支撑和导辊。 在每个组件中,一个辊在边缘重叠处与横截面封闭的传送带接合。 传送路径的每个长度部分中的封闭的管状构造具有椭圆形横截面。 支撑和导向辊使输送带进入椭圆形截面的封闭管状结构。 每个组件的第一支撑和导向辊可设置在重叠边缘部分的区域上。

    METHODS AND APPARATUS FOR DEALING WITH MALWARE

    公开(公告)号:US20120278895A1

    公开(公告)日:2012-11-01

    申请号:US13543866

    申请日:2012-07-08

    IPC分类号: G06F21/00

    CPC分类号: G06F21/56 G06F21/577

    摘要: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object;the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

    METHODS AND APPARATUS FOR DEALING WITH MALWARE
    4.
    发明申请
    METHODS AND APPARATUS FOR DEALING WITH MALWARE 有权
    用于处理恶意软件的方法和装置

    公开(公告)号:US20120278891A1

    公开(公告)日:2012-11-01

    申请号:US13543865

    申请日:2012-07-08

    IPC分类号: G06F21/00

    CPC分类号: G06F21/56 G06F21/577

    摘要: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object;the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

    摘要翻译: 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。

    Methods and apparatus for dealing with malware
    5.
    发明申请
    Methods and apparatus for dealing with malware 有权
    用于处理恶意软件的方法和设备

    公开(公告)号:US20070016953A1

    公开(公告)日:2007-01-18

    申请号:US11477807

    申请日:2006-06-30

    IPC分类号: G06F12/14

    CPC分类号: G06F21/56 G06F21/577

    摘要: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

    摘要翻译: 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。

    Host intrusion prevention system and method
    6.
    发明申请
    Host intrusion prevention system and method 审中-公开
    主机入侵防御系统和方法

    公开(公告)号:US20060026684A1

    公开(公告)日:2006-02-02

    申请号:US11183322

    申请日:2005-07-18

    IPC分类号: G06F12/14

    摘要: A system and method of host intrusion prevention for preventing intrusion into a computer system is disclosed. Requests to access a resource of the computer system are monitored. It is determined whether the requested access is to be permitted or not in accordance with a policy. The requested access is allowed or denied accordingly.

    摘要翻译: 公开了一种用于防止入侵计算机系统的主机入侵防御的系统和方法。 监视访问计算机系统资源的请求。 根据策略确定是否允许所请求的访问。 相应地允许或拒绝请求的访问。

    Methods and apparatus for dealing with malware
    7.
    发明授权
    Methods and apparatus for dealing with malware 有权
    用于处理恶意软件的方法和设备

    公开(公告)号:US08763123B2

    公开(公告)日:2014-06-24

    申请号:US13543865

    申请日:2012-07-08

    IPC分类号: G06F11/00

    CPC分类号: G06F21/56 G06F21/577

    摘要: In one aspect, a method of determining the protection that a remote computer has from malware includes receiving at a base computer, details of all or selected security products operating on a remote computer, receiving similar information from other remote computers, and identifying malware process that were not identified by the security products installed on the other remote computers and having a same or similar combination of security products installed on the remote computer.

    摘要翻译: 一方面,确定远程计算机从恶意软件获得的保护的方法包括在基本计算机处接收在远程计算机上操作的所有或所选择的安全产品的细节,从其他远程计算机接收类似信息,以及识别恶意软件进程, 未被其他远程计算机上安装的安全产品识别,并且具有安装在远程计算机上的相同或相似的安全产品组合。

    Methods and apparatus for dealing with malware
    8.
    发明授权
    Methods and apparatus for dealing with malware 有权
    用于处理恶意软件的方法和设备

    公开(公告)号:US08418250B2

    公开(公告)日:2013-04-09

    申请号:US11477807

    申请日:2006-06-30

    IPC分类号: G06F21/00

    CPC分类号: G06F21/56 G06F21/577

    摘要: In one aspect, a method of classifying a computer object as malware includes receiving at a base computer data about a computer object from each of plural remote computers on which the object or similar objects are stored. The data about the computer object received from the plural computers is compared in the base computer. The computer object is classified as malware on the basis of said comparison. In one embodiment, the data about the computer object includes one or more of: executable instructions contained within or constituted by the object; the size of the object; the name of the object; the logical storage location or path of the object on the respective remote computers; the vendor of the object; the software product and version associated with the object; and, events initiated by or involving the object when the object is created, configured or runs on the respective remote computers.

    摘要翻译: 一方面,将计算机对象分类为恶意软件的方法包括在基础计算机上从存储有对象或类似对象的多个远程计算机中的每一个接收关于计算机对象的数据。 在基本计算机中比较从多台计算机接收的关于计算机对象的数据。 基于所述比较,计算机对象被分类为恶意软件。 在一个实施例中,关于计算机对象的数据包括以下中的一个或多个:包含在对象内或由对象构成的可执行指令; 对象的大小; 对象的名称; 对象在相应远程计算机上的逻辑存储位置或路径; 对象的供应商; 与该对象相关联的软件产品和版本; 以及在对象创建,配置或运行在相应远程计算机上时由对象发起或涉及对象的事件。