System and method for decrypting files
    1.
    发明授权
    System and method for decrypting files 有权
    用于解密文件的系统和方法

    公开(公告)号:US08787567B2

    公开(公告)日:2014-07-22

    申请号:US13031948

    申请日:2011-02-22

    IPC分类号: G06F21/00

    摘要: In accordance with particular embodiments, a computer-implemented method for execution by one or more processors includes intercepting a communication comprising a message. The method also includes identifying words from within the message. The method further includes storing in a dictionary words from within the message of the communication and one or more parameters of the communication for each of the words. The dictionary comprises a plurality of words from a plurality of intercepted text-based communications. The method also includes receiving an encrypted file that is configured to be decrypted using a password. The method additionally includes identifying words from the dictionary to be used to attempt to decrypt the encrypted file. The identified words are identified based on at least one parameter associated with the encrypted file and the one or more parameters stored in the dictionary. The method further includes attempting to decrypt the encrypted file using at least a portion of the identified words from the dictionary as the password for decrypting the encrypted attachment.

    摘要翻译: 根据特定实施例,用于由一个或多个处理器执行的计算机实现的方法包括拦截包括消息的通信。 该方法还包括从消息内识别单词。 该方法还包括在通信消息内的词典中存储词,并且为每个单词存储通信的一个或多个参数。 字典包括来自多个截取的基于文本的通信中的多个单词。 该方法还包括接收被配置为使用密码解密的加密文件。 该方法还包括识别要用于尝试解密加密文件的字典中的字。 基于与加密文件相关联的至少一个参数和存储在字典中的一个或多个参数来识别所识别的词。 该方法还包括尝试使用来自字典的所识别的字的至少一部分来解密加密文件作为用于解密加密附件的密码。

    Data security method and system
    2.
    发明授权
    Data security method and system 有权
    数据安全方法和系统

    公开(公告)号:US08621223B2

    公开(公告)日:2013-12-31

    申请号:US12164814

    申请日:2008-06-30

    IPC分类号: H04L9/32

    CPC分类号: H04L9/3236 H04L9/3247

    摘要: A method of verifying integrity of a digital file includes receiving the digital file subsequent to exposure to a foreign environment and validating the digital file. The received digital file has an appended signature label that includes one or both of a first hash value and a digital signature. Validating the digital file includes hashing the digital file to obtain a second hash value, retrieving the first hash value from the signature label, and comparing the first hash value and second hash value.

    摘要翻译: 验证数字文件的完整性的方法包括在暴露于外部环境之后接收数字文件并验证数字文件。 所接收的数字文件具有包括第一哈希值和数字签名中的一个或两者的附加签名标签。 验证数字文件包括散列数字文件以获得第二散列值,从签名标签中检索第一散列值,以及比较第一散列值和第二散列值。

    System And Method For Detecting Malware In Documents
    3.
    发明申请
    System And Method For Detecting Malware In Documents 有权
    文件中检测恶意软件的系统和方法

    公开(公告)号:US20130145466A1

    公开(公告)日:2013-06-06

    申请号:US13312767

    申请日:2011-12-06

    IPC分类号: G06F21/00

    CPC分类号: G06F21/562

    摘要: In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware.

    摘要翻译: 在一个实施例中,一种方法包括使用一个或多个处理器识别便携式文档格式(PDF)文件的多个特征。 该方法还包括使用一个或多个处理器对于多个特征中的每一个来确定对应于该特征的得分。 另外,该方法包括将所确定的分数与第一阈值进行比较。 至少基于所确定的分数与第一阈值的比较,该方法包括使用一个或多个处理器来确定该PDF文件是潜在的恶意软件。

    Distributed Malware Detection
    4.
    发明申请
    Distributed Malware Detection 有权
    分布式恶意软件检测

    公开(公告)号:US20120330801A1

    公开(公告)日:2012-12-27

    申请号:US13169574

    申请日:2011-06-27

    IPC分类号: G06F21/00 G06Q30/00

    CPC分类号: G06F21/577 G06F21/56

    摘要: According to one embodiment, a computer-implemented method includes accessing, using one or more processing units, a first file of a plurality of files requested to be analyzed for malware. Each of the plurality of files corresponds to a respective remote client of a plurality of remote clients. Further, the method includes: processing, using the one or more processing units, an analysis of the first file for malware; and generating an output comprising an indication of whether the first file comprises malware. The method also includes accessing, using the one or more processing units, an address for a first remote client of the plurality of remote clients. The first remote client is the respective remote client corresponding to the first file. In addition, the method includes: sending, using the one or more processing units, the output in a communication addressed to the first remote client corresponding to the first file.

    摘要翻译: 根据一个实施例,计算机实现的方法包括使用一个或多个处理单元访问请求分析恶意软件的多个文件的第一文件。 多个文件中的每一个对应于多个远程客户端的相应的远程客户端。 此外,该方法包括:使用所述一个或多个处理单元处理第一文件的恶意软件的分析; 以及生成包括所述第一文件是否包括恶意软件的指示的输出。 该方法还包括使用一个或多个处理单元访问多个远程客户端中的第一远程客户端的地址。 第一个远程客户端是对应于第一个文件的相应的远程客户端。 此外,该方法包括:使用一个或多个处理单元,在与第一文件相对应的通向寻址到第一远程客户端的通信中发送输出。

    System, method, and logic for classifying communications
    5.
    发明授权
    System, method, and logic for classifying communications 有权
    用于分类通信的系统,方法和逻辑

    公开(公告)号:US08875293B2

    公开(公告)日:2014-10-28

    申请号:US13240567

    申请日:2011-09-22

    IPC分类号: H04L29/06 G06F21/56 G06F21/55

    CPC分类号: G06F21/554 G06F21/56

    摘要: In accordance with particular embodiments, a method includes intercepting a communication and extracting metadata associated with the communication. The extracted metadata comprises a plurality of different fields from communication metadata and file metadata. The method further includes determining a score, based on previous communications, for each field of the extracted metadata. The score is indicative of a likelihood that the communication is a malicious communication. The method additionally includes combining the scores to generate a combined score for the communication based on an algorithm developed from the previous communications. The method also includes generating, based on the combined score at a first time, a predicted classification as to whether the communication is a malicious communication. The method further includes receiving, at a second time subsequent to the first time, an indication of whether the communication is a malicious communication and updating the algorithm based on the indication.

    摘要翻译: 根据特定实施例,一种方法包括拦截通信并提取与通信相关联的元数据。 所提取的元数据包括来自通信元数据和文件元数据的多个不同的字段。 该方法还包括基于先前的通信确定所提取的元数据的每个字段的得分。 该分数表示通信是恶意通信的可能性。 该方法还包括组合分数以基于从先前通信开发的算法生成用于通信的组合分数。 该方法还包括基于第一次的组合得分,生成关于通信是恶意通信的预测分类。 该方法还包括在第一次之后的第二时间接收关于通信是恶意通信的指示,还是基于该指示来更新算法。

    Multi-nodal malware analysis
    6.
    发明授权
    Multi-nodal malware analysis 有权
    多节点恶意软件分析

    公开(公告)号:US08839434B2

    公开(公告)日:2014-09-16

    申请号:US13087447

    申请日:2011-04-15

    IPC分类号: G06F21/56

    CPC分类号: G06F21/567

    摘要: A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts. Each host is capable of running a corresponding set of malware detection processes. The information includes: an identifier of the first file; and data indicating a first result of the first host applying the set of malware detection processes to the first file. The identifier is generated by the first host and is usable by each of the hosts to determine whether a second file comprises content substantially equivalent to content of the first file. The analysis console generates a first output including: the identifier of the first file; and a second result indicating whether the first file comprises malware. The second result is usable by each of the hosts to determine whether the second file comprises malware. The first output is propagated to the hosts.

    摘要翻译: 计算机实现的方法包括通过分析控制台访问与在多个主机的第一主机处接收到的第一文件相关的信息。 每个主机都能够运行相应的恶意软件检测过程。 该信息包括:第一文件的标识符; 以及指示将所述一组恶意软件检测处理应用于所述第一文件的所述第一主机的第一结果的数据。 标识符由第一主机生成,并且可由每个主机使用,以确定第二文件是否包含与第一文件的内容基本相同的内容。 分析控制台生成第一输出,包括:第一文件的标识符; 以及指示第一文件是否包括恶意软件的第二结果。 每个主机可以使用第二个结果来确定第二个文件是否包含恶意软件。 第一个输出传播到主机。

    Detecting malware using patterns
    7.
    发明授权
    Detecting malware using patterns 有权
    使用模式检测恶意软件

    公开(公告)号:US08510841B2

    公开(公告)日:2013-08-13

    申请号:US13312639

    申请日:2011-12-06

    IPC分类号: G06F11/30 G06F7/00

    CPC分类号: G06F21/56 G06F21/562

    摘要: In certain embodiments, a method includes receiving a first file. The method also includes accessing at least one storage module comprising a first malware pattern, a second malware pattern, and a third malware pattern. The second malware pattern is a first permutation of the first malware pattern. The third malware pattern is a second permutation of the second malware pattern and is different than the second malware pattern. The method includes comparing, by at least one processor, the first file to the third malware pattern. In addition, the method includes determining, by the at least one processor, that the first file comprises malware in response to comparing the file to the third malware pattern.

    摘要翻译: 在某些实施例中,一种方法包括接收第一文件。 该方法还包括访问包括第一恶意软件模式,第二恶意软件模式和第三恶意软件模式的至少一个存储模块。 第二个恶意软件模式是第一个恶意软件模式的排列。 第三个恶意软件模式是第二个恶意软件模式的第二个排列,并且与第二个恶意软件模式不同。 该方法包括通过至少一个处理器将第一文件与第三恶意软件模式进行比较。 此外,该方法包括响应于将文件与第三恶意软件模式进行比较,由至少一个处理器确定第一文件包括恶意软件。

    DETECTING MALWARE USING PATTERNS
    8.
    发明申请
    DETECTING MALWARE USING PATTERNS 有权
    使用模式检测恶意软件

    公开(公告)号:US20130145470A1

    公开(公告)日:2013-06-06

    申请号:US13312639

    申请日:2011-12-06

    IPC分类号: G06F21/00

    CPC分类号: G06F21/56 G06F21/562

    摘要: In certain embodiments, a method includes receiving a first file. The method also includes accessing at least one storage module comprising a first malware pattern, a second malware pattern, and a third malware pattern. The second malware pattern is a first permutation of the first malware pattern. The third malware pattern is a second permutation of the second malware pattern and is different than the second malware pattern. The method includes comparing, by at least one processor, the first file to the third malware pattern. In addition, the method includes determining, by the at least one processor, that the first file comprises malware in response to comparing the file to the third malware pattern.

    摘要翻译: 在某些实施例中,一种方法包括接收第一文件。 该方法还包括访问包括第一恶意软件模式,第二恶意软件模式和第三恶意软件模式的至少一个存储模块。 第二个恶意软件模式是第一个恶意软件模式的排列。 第三个恶意软件模式是第二个恶意软件模式的第二个排列,并且与第二个恶意软件模式不同。 该方法包括通过至少一个处理器将第一文件与第三恶意软件模式进行比较。 此外,该方法包括响应于将文件与第三恶意软件模式进行比较,由至少一个处理器确定第一文件包括恶意软件。

    Proxy-Based Network Access Protection
    9.
    发明申请
    Proxy-Based Network Access Protection 有权
    基于代理的网络访问保护

    公开(公告)号:US20120005719A1

    公开(公告)日:2012-01-05

    申请号:US12828874

    申请日:2010-07-01

    申请人: Monty D. McDougal

    发明人: Monty D. McDougal

    摘要: In certain embodiments, a method includes receiving, at a proxy, a request for access to a network from an application on an endpoint. The method also includes determining, by the proxy, information about the application on the endpoint by examining one or more headers of the request received at the proxy from the application. The method further includes determining, by the proxy, whether the one or more headers comprise expected information based on the determined information about the application. In response to determining that the one or more headers do not comprise the expected information, the method includes denying, by the proxy, the request for access to the network. In addition, in response to determining that the one or more headers comprise the expected information, the method includes forwarding, by the proxy, the request to the network on behalf of the application.

    摘要翻译: 在某些实施例中,一种方法包括在代理处从端点上的应用接收对网络的访问请求。 该方法还包括通过检查从应用程序在代理处接收到的请求的一个或多个头部,由代理确定关于端点上的应用的信息。 所述方法还包括由所述代理确定所述一个或多个报头是否基于所确定的关于所述应用的信息来包括预期信息。 响应于确定一个或多个头部不包括预期信息,该方法包括由代理拒绝访问网络的请求。 此外,响应于确定一个或多个头部包括预期信息,该方法包括由代理人代表应用向网络转发该请求。

    Method and System For Controlling The Release of Data For Multiple-Level Security Systems
    10.
    发明申请
    Method and System For Controlling The Release of Data For Multiple-Level Security Systems 审中-公开
    用于控制多级安全系统数据发布的方法和系统

    公开(公告)号:US20080082960A1

    公开(公告)日:2008-04-03

    申请号:US11537350

    申请日:2006-09-29

    IPC分类号: G06F9/44

    CPC分类号: H04L63/105 G06Q10/06

    摘要: In a method embodiment, a method for controlling the release of data includes providing a list of a plurality of modules. Each module is operable to perform a task related to releasing data. The method further includes receiving a selection of an ordered set of the plurality of modules to use in a workflow. The workflow defines a procedure for releasing the data. The method also includes automatically generating a program implementing the workflow.

    摘要翻译: 在方法实施例中,用于控制数据释放的方法包括提供多个模块的列表。 每个模块可操作以执行与释放数据有关的任务。 该方法还包括接收在工作流中使用的多个模块的有序集合的选择。 工作流程定义了释放数据的过程。 该方法还包括自动生成实现工作流的程序。