Scanning application binaries to identify database queries
    1.
    发明授权
    Scanning application binaries to identify database queries 有权
    扫描应用程序二进制文件以识别数据库查询

    公开(公告)号:US07904472B1

    公开(公告)日:2011-03-08

    申请号:US11522786

    申请日:2006-09-18

    CPC classification number: G06F17/30421 G06F17/30306 G06F17/30427

    Abstract: Binary files of one or more applications are scanned to identify database command templates contained therein, wherein each DB command template comprises a sequence of elements including one or more input markers. Once the DB command templates are identified, they are copied to a memory. While in the memory, the command templates can be used to identify abnormal DB commands. In one embodiment of a method, a first template is generated in response to receiving a first DB command from a computer system, wherein the first DB command comprises a sequence of elements including one or more user input values. The first template can be generated by replacing all user input values in the received first DB command with input markers. Thereafter the first template is compared to one or more of the DB command templates copied to the memory.

    Abstract translation: 扫描一个或多个应用的​​二进制文件以识别其中包含的数据库命令模板,其中每个DB命令模板包括包括一个或多个输入标记的元素序列。 一旦DB命令模板被识别,它们被复制到存储器中。 在内存中,命令模板可用于识别异常DB命令。 在方法的一个实施例中,响应于从计算机系统接收到第一DB命令而产生第一模板,其中第一DB命令包括包括一个或多个用户输入值的元素序列。 可以通过使用输入标记替换接收到的第一个DB命令中的所有用户输入值来生成第一个模板。 此后,将第一个模板与复制到存储器的一个或多个DB命令模板进行比较。

    Method and apparatus for detecting malicious software activity based on an internet resource information database
    2.
    发明授权
    Method and apparatus for detecting malicious software activity based on an internet resource information database 有权
    基于互联网资源信息数据库检测恶意软件活动的方法和装置

    公开(公告)号:US08978139B1

    公开(公告)日:2015-03-10

    申请号:US12494165

    申请日:2009-06-29

    CPC classification number: H04L63/1416 G06F21/552 H04L63/168

    Abstract: A method and apparatus for detecting malicious software activity, using at least one processor, based on an Internet resource information database in memory is described. In one embodiment, a method for detecting malicious software activity, using at least one processor, based on an Internet resource information database in memory includes processing Internet activity to determine source and time information associated with at least one application download, comparing the Internet resource information database with the source and time information associated with the at least one application download to identify at least one suspicious application, and monitoring execution of the at least one suspicious application.

    Abstract translation: 描述了一种基于存储器中的因特网资源信息数据库使用至少一个处理器来检测恶意软件活动的方法和装置。 在一个实施例中,使用基于存储器中的因特网资源信息数据库的至少一个处理器来检测恶意软件活动的方法包括处理因特网活动以确定与至少一个应用下载相关联的源和时间信息,比较因特网资源信息 数据库,其中与所述至少一个应用程序相关联的源和时间信息下载以识别至少一个可疑应用程序,以及监视所述至少一个可疑应用程序的执行。

    Automated blueprint assembly for assembling an application
    3.
    发明授权
    Automated blueprint assembly for assembling an application 有权
    用于组装应用程序的自动蓝图组件

    公开(公告)号:US08914768B2

    公开(公告)日:2014-12-16

    申请号:US13433162

    申请日:2012-03-28

    CPC classification number: G06F8/35 G06F8/10 G06F8/20 G06F8/61

    Abstract: The embodiments provide a data processing apparatus for automated blueprint assembly. The data processing apparatus includes a micro-blueprint assembler configured to receive a request for automated blueprint assembly for assembling an application, where the request specifies at least one feature, and a model database configured to store model data. The model data includes a plurality of classes and class properties. The data processing apparatus further includes a micro-blueprint database configured to store a plurality of micro-blueprints. Each micro-blueprint corresponds to a functional component of a stack element or service tier, and the functional component is annotated with one or more classes of the plurality of classes and at least one required capability and available capability. The micro-blueprint assembler is configured to generate at least one application blueprint based on the model data and the plurality of micro-blueprints according to the request.

    Abstract translation: 实施例提供了一种用于自动化蓝图组装的数据处理装置。 数据处理装置包括微蓝图汇编器,其被配置为接收用于组装应用的自动化蓝图组件的请求,其中请求指定至少一个特征,以及被配置为存储模型数据的模型数据库。 模型数据包括多个类和类属性。 数据处理装置还包括配置为存储多个微蓝图的微蓝图数据库。 每个微蓝图对应于堆栈元素或服务层的功能组件,并且功能组件用多个类中的一个或多个类别和至少一个所需的能力和可用能力注释。 微蓝图装配器被配置为根据请求生成基于模型数据和多个微蓝图的至少一个应用蓝图。

    AUTOMATED BLUEPRINT ASSEMBLY FOR ASSEMBLING AN APPLICATION

    公开(公告)号:US20130263080A1

    公开(公告)日:2013-10-03

    申请号:US13433162

    申请日:2012-03-28

    CPC classification number: G06F8/35 G06F8/10 G06F8/20 G06F8/61

    Abstract: The embodiments provide a data processing apparatus for automated blueprint assembly. The data processing apparatus includes a micro-blueprint assembler configured to receive a request for automated blueprint assembly for assembling an application, where the request specifies at least one feature, and a model database configured to store model data. The model data includes a plurality of classes and class properties. The data processing apparatus further includes a micro-blueprint database configured to store a plurality of micro-blueprints. Each micro-blueprint corresponds to a functional component of a stack element or service tier, and the functional component is annotated with one or more classes of the plurality of classes and at least one required capability and available capability. The micro-blueprint assembler is configured to generate at least one application blueprint based on the model data and the plurality of micro-blueprints according to the request.

    Method and apparatus for providing a utility-based model for security software revenue generation
    5.
    发明授权
    Method and apparatus for providing a utility-based model for security software revenue generation 有权
    用于提供用于安全软件创收的基于效用的模型的方法和装置

    公开(公告)号:US08065179B1

    公开(公告)日:2011-11-22

    申请号:US12210243

    申请日:2008-09-15

    CPC classification number: G06Q10/107 G06Q10/06 G06Q30/0206

    Abstract: A method and apparatus for providing a utility based revenue stream for a security software subscription at a client computer is provided. In one embodiment, the method for providing a utility based revenue stream for a security software subscription at a client computer comprises analyzing a security activity log based on a utility metric to produce an analysis result and determining a value for the security software subscription based on the analysis result.

    Abstract translation: 提供了一种用于在客户端计算机上提供用于安全软件订阅的基于公用事业的收入流的方法和装置。 在一个实施例中,用于在客户端计算机上为安全软件订阅提供基于公用事业的收入流的方法包括基于效用度量来分析安全活动日志以产生分析结果,并且基于所述安全软件订阅确定所述安全软件订阅的值 分析结果。

    Method and apparatus for cloning a configuration of a computer in a data center
    6.
    发明授权
    Method and apparatus for cloning a configuration of a computer in a data center 有权
    在数据中心中克隆计算机的配置的方法和装置

    公开(公告)号:US08037289B1

    公开(公告)日:2011-10-11

    申请号:US12131706

    申请日:2008-06-02

    CPC classification number: G06F9/44505 G06F9/5061

    Abstract: A method and apparatus for cloning a configuration of a computer in a datacenter is described in the present application. In one embodiment, the method comprises accessing a configuration snapshot for a computer in a data center, wherein the configuration snapshot defines at least one configuration attribute for at least one computer resource and indicates an operating system and at least one software application and provisioning a hardware computer in the data center based on the configuration snapshot.

    Abstract translation: 在本申请中描述了用于克隆数据中心中的计算机的配置的方法和装置。 在一个实施例中,该方法包括访问数据中心中的计算机的配置快照,其中配置快照为至少一个计算机资源定义至少一个配置属性,并且指示操作系统和至少一个软件应用程序并且提供硬件 计算机在数据中心基于配置快照。

    Managing server resources for hosted applications
    7.
    发明授权
    Managing server resources for hosted applications 失效
    管理托管应用程序的服务器资源

    公开(公告)号:US07174379B2

    公开(公告)日:2007-02-06

    申请号:US09921868

    申请日:2001-08-03

    CPC classification number: G06F9/505 G06F9/5055 H04L67/20 H04L67/22 H04L69/329

    Abstract: In an ASP server farm, requests to use an application are directed to a particular executing instance of the application (or an appropriate component thereof) that is identified as being the least loaded of the available such instances of the application or its component. The number of such instances is dynamically increased or decreased in response to the number of requests for the application or components thereof. Requests may be directed (in accordance with the first aspect) or the instances adjusted (in accordance with a second aspect) on a per client-basis, in which instances of the application and/or components thereof are reserved for the use of a user or a particular group of users. Operation in this manner facilitates compliance with service agreements with respective users or groups of users.

    Abstract translation: 在ASP服务器场中,使用应用程序的请求被引导到应用程序的特定执行实例(或其适当的组件),该实例被标识为应用程序或其组件的可用这样的实例的最少加载。 响应于应用程序的请求数量或其组件的数量,这种实例的数量被动态地增加或减少。 请求可以针对每个客户端(根据第一方面)或被调整(根据第二方面)的实例,其中应用和/或其组件的实例被保留用于使用用户 或特定的一组用户。 以这种方式进行操作便于遵守与各个用户或用户组的服务协议。

    Synchronous collaboration based on peer-to-peer communication
    8.
    发明授权
    Synchronous collaboration based on peer-to-peer communication 失效
    基于对等通信的同步协作

    公开(公告)号:US06898642B2

    公开(公告)日:2005-05-24

    申请号:US09836120

    申请日:2001-04-17

    CPC classification number: H04L12/1827 G06F17/30168 G06F17/30206

    Abstract: A peer-to-peer protocol is based on the use of global timestamps and client priorities in serializing modifications to a shared workspace of real-time collaboration. The method caters to dynamic clients wherein a client can leave or join an ongoing collaboration session as long as there is always at least one client present/remaining in the collaboration session. The method can support multiple definitions of a modification, including partitioning-based definitions, wherein the method provides full support for locking of partitions, and a full treatment of inter-partition synchronization via a modification definition over multiple partitions. The method is capable of utilizing the many standard methods of creating a global, distributed, synchronized clock for the global timestamps utilized by it. The method is rollback-based for correcting tentative but incorrect serializations, and provides additional backup in terms of checkpoints for additional safety and for the support of lightweight, pervasive clients. The method includes many optimizations for efficiency, and includes a method of switching to and back from distributed server-based serialization for the periods when the network response is better suited to a distributed server than the peer-to-peer protocol.

    Abstract translation: 一个对等协议是基于使用全局时间戳和客户端优先级对串行化对实时协作的共享工作空间的修改。 该方法适用于动态客户端,其中客户端可以离开或加入正在进行的协作会话,只要始终至少有一个客户端存在/保留在协作会话中。 该方法可以支持修改的多个定义,包括基于分区的定义,其中该方法提供对分区的锁定的完全支持,以及通过多个分区的修改定义对分区间同步的全面处理。 该方法能够利用为其所使用的全局时间戳创建全局,分布式同步时钟的许多标准方法。 该方法是基于回滚的,用于纠正暂定但不正确的序列化,并且在检查点方面提供额外的备份,以获得更多的安全性,并支持轻量级,普及的客户端。 该方法包括许多效率优化,并且包括在网络响应比对等协议更适合于分布式服务器的时期期间切换到基于分布式服务器的串行化的方法。

Patent Agency Ranking