Virtual parts having configuration points and virtual ports for virtual solution composition and deployment
    1.
    发明授权
    Virtual parts having configuration points and virtual ports for virtual solution composition and deployment 失效
    虚拟部件具有用于虚拟解决方案组合和部署的配置点和虚拟端口

    公开(公告)号:US08612976B2

    公开(公告)日:2013-12-17

    申请号:US13570711

    申请日:2012-08-09

    CPC分类号: G06F8/36

    摘要: Various embodiments disclose a method and system for creating a virtual part used for composing a virtual solution. In one embodiment, a user's selection of at least one virtual image is received. A set of configurability points is associated with the virtual image. A set of parameters of a virtual part is set as configurable during virtual solution composition. A set of virtual ports is generated. Each virtual port within the set of virtual ports indicates at least one of a set of virtual parts required by a virtual part including the set of virtual ports and a set of virtual parts that is compatible with the virtual part. A set of configuration operations is received. A virtual part including at least the virtual image, the set of configurability points, the set of virtual ports, and the configuration operations is generated.

    摘要翻译: 各种实施例公开了用于创建用于构成虚拟解决方案的虚拟部件的方法和系统。 在一个实施例中,接收用户对至少一个虚拟图像的选择。 一组可配置点与虚拟图像相关联。 在虚拟解决方案组合期间将虚拟部分的一组参数设置为可配置的。 生成一组虚拟端口。 虚拟端口集合内的每个虚拟端口指示包括虚拟端口组的虚拟部分所需的一组虚拟部分和与虚拟部分兼容的一组虚拟部分中的至少一个。 接收一组配置操作。 生成至少包括虚拟图像,可配置点集合,虚拟端口组以及配置操作的虚拟部分。

    Method and apparatus for determination of the non-replicative behavior of a malicious program
    2.
    发明授权
    Method and apparatus for determination of the non-replicative behavior of a malicious program 有权
    用于确定恶意程序的非复制行为的方法和装置

    公开(公告)号:US07861300B2

    公开(公告)日:2010-12-28

    申请号:US12141165

    申请日:2008-06-18

    IPC分类号: G06F11/00

    CPC分类号: G06F21/566

    摘要: Disclosed is a method, a computer system and a computer readable media product that contains a set of computer executable software instructions for directing the computer system to execute a process for determining a non-replicative behavior of a program that is suspected of containing an undesirable software entity. The process causes execution of the program in at least one known environment and automatically examines the at least one known environment to detect if a change has occurred in the environment as a result of the execution of the program. If a change is detected, the process automatically analyzes the detected change (i.e., the process performs a side effects analysis) to determine if the change resulted from execution of the program or from execution of the undesirable software entity. The process then uses the result of the analysis at least for undoing a detected change that results from execution of the undesirable software entity. The result of the analysis can also be used for informing a user of an anti-virus system of the non-replicative changes made to the environment.

    摘要翻译: 公开了一种方法,计算机系统和计算机可读介质产品,其包含一组计算机可执行软件指令,用于指导计算机系统执行用于确定怀疑含有不期望的软件的程序的非复制行为的过程 实体。 该过程导致在至少一个已知环境中执行该程序,并且自动检查该至少一个已知环境以检测由于该程序的执行而在该环境中是否发生了改变。 如果检测到改变,则该过程自动分析检测到的变化(即,过程执行副作用分析),以确定改变是由执行程序还是由不期望的软件实体的执行引起。 该过程然后使用分析结果至少用于撤销由不期望的软件实体的执行导致的检测到的改变。 分析的结果也可以用于向用户通知反病毒系统对环境的非复制变化。

    DEPLOYMENT PATTERN REALIZATION WITH MODELS OF COMPUTING ENVIRONMENTS
    3.
    发明申请
    DEPLOYMENT PATTERN REALIZATION WITH MODELS OF COMPUTING ENVIRONMENTS 失效
    与计算环境模型的部署模式实现

    公开(公告)号:US20100070449A1

    公开(公告)日:2010-03-18

    申请号:US12210139

    申请日:2008-09-12

    IPC分类号: G06N5/02

    CPC分类号: G06N5/02

    摘要: Deployment pattern matching is implemented by accessing a target computing environment model that captures environment modeling parameters relating to resources and resource-resource relationships of a corresponding computing environment and expressing the target computing environment model as a model graph defined by target resource elements and resource-to-resource relationship links. Deployment pattern matching is further implemented by accessing a realization pattern that captures deployment parameters relating to resources and resource-resource relationships of a deployment of interest and expressing the realization pattern as a pattern graph defined by conceptual resource elements and constraints arranged by resource-to-resource relationship links and constraint links. The realization pattern is then evaluated against the target computing environment model by executing at least one pattern matching algorithm that attempts to match the pattern graph to the model graph and information corresponding to results of the evaluation are conveyed.

    摘要翻译: 通过访问捕获与相应计算环境的资源和资源 - 资源关系相关的环境建模参数的目标计算环境模型来实现部署模式匹配,并将目标计算环境模型表示为由目标资源元素和资源到 资源关系链接。 通过访问捕获与资源相关的部署参数和感兴趣的部署的资源 - 资源关系的实现模式进一步实现部署模式匹配,并且将实现模式表示为由概念资源元素定义的模式图,并且由资源 - 资源关系链接和约束链接。 然后通过执行尝试将模式图与模型图匹配的至少一个模式匹配算法来针对目标计算环境模型来评估实现模式,并且传达与评估结果相对应的信息。

    Method and apparatus for the automatic determination of potentially worm-like behavior of a program
    4.
    发明授权
    Method and apparatus for the automatic determination of potentially worm-like behavior of a program 有权
    用于自动确定程序的潜在蠕虫状行为的方法和装置

    公开(公告)号:US07487543B2

    公开(公告)日:2009-02-03

    申请号:US10202517

    申请日:2002-07-23

    CPC分类号: G06F21/51

    摘要: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.

    摘要翻译: 用于自动确定涉嫌具有蠕虫特征的程序的行为特征的方法和系统包括分析程序所需的数据处理系统资源,并且如果所需资源不表示具有蠕虫状特征的程序, 在受控的非网络环境中运行程序,同时监视和记录对系统资源的访问,以确定非网络环境中程序的行为。 分析观察行为的记录记录,以确定行为是否表明具有蠕虫状特征的程序。 非网络环境可以模拟网络对程序的外观,而不模拟网络的操作。

    Automatic immune system for computers and computer networks
    5.
    发明授权
    Automatic immune system for computers and computer networks 失效
    用于计算机和计算机网络的自动免疫系统

    公开(公告)号:US5440723A

    公开(公告)日:1995-08-08

    申请号:US4872

    申请日:1993-01-19

    摘要: A method includes the following component steps, or some functional subset of these steps: (A) periodic monitoring of a data processing system (10) for anomalous behavior that may indicate the presence of an undesirable software entity such as a computer virus, worm, or Trojan Horse; (B) automatic scanning for occurrences of known types of undesirable software entities and taking remedial action if they are discovered; (C) deploying decoy programs to capture samples of unknown types of computer viruses; (D) identifying machine code portions of the captured samples which are unlikely to vary from one instance of the virus to another; (E) extracting an identifying signature from the executable code portion and adding the signature to a signature database; (F) informing neighboring data processing systems on a network of an occurrence of the undesirable software entity; and (G) generating a distress signal, if appropriate, so as to call upon an expert to resolve difficult cases. A feature of this invention is the automatic execution of the foregoing steps in response to a detection of an undesired software entity, such as a virus or a worm, within a data processing system. The automatic extraction of the identifying signature, the addition of the signature to a signature data base, and the immediate use of the signature by a scanner provides protection from subsequent infections of the system, and also a network of systems, by the same or an altered form of the undesirable software entity.

    摘要翻译: 一种方法包括以下组件步骤或这些步骤的一些功能子集:(A)针对异常行为的数据处理系统(10)的周期性监视,其可以指示存在不期望的软件实体,例如计算机病毒,蠕虫, 或特洛伊木马; (B)自动扫描已知类型的不合需要的软件实体,并发现补救措施; (C)部署诱饵计划以捕获未知类型的计算机病毒样本; (D)识别捕获的样本的机器代码部分,其不可能从病毒的一个实例变化到另一个; (E)从可执行代码部分提取识别签名并将签名添加到签名数据库; (F)通知网络上的相邻数据处理系统出现不期望的软件实体; 和(G)如果适当,产生遇险信号,以呼吁专家解决困难的情况。 本发明的一个特征是响应于在数据处理系统内检测不期望的软件实体(例如病毒或蠕虫)来自动执行上述步骤。 识别签名的自动提取,签名数据库的签名添加以及扫描仪的签名的即时使用提供了保护,防止系统的随后的感染以及系统的相同或不同的系统的网络 改变形式的不良软件实体。

    IMAGE ASSET LIFECYCLE MANAGEMENT IN A COMPUTING ENVIRONMENT
    8.
    发明申请
    IMAGE ASSET LIFECYCLE MANAGEMENT IN A COMPUTING ENVIRONMENT 有权
    计算环境中的图像资产生物管理

    公开(公告)号:US20120084752A1

    公开(公告)日:2012-04-05

    申请号:US12895538

    申请日:2010-09-30

    IPC分类号: G06F9/44

    CPC分类号: G06F8/63

    摘要: Lifecycles of virtual image assets are managed as follows. A set of assets including a set virtual image assets and a set of software bundle assets are analyzed. At least a portion of relationship data between one or more of the virtual image assets and one or more of the software bundle assets is determined. The at least a portion of relationship data is stored in a memory. At least one of one or more virtual image assets and one or more software bundle assets are determined to be associated with a set of changes. At least one virtual image asset that is related to the one or more virtual image assets and/or one or more software bundle assets associated with the set of changes is identified. The at least one virtual image asset that has been identified is updated based on the set of changes.

    摘要翻译: 虚拟图像资产的生命周期管理如下。 分析一组资产,包括设置的虚拟图像资产和一组软件包资产。 确定一个或多个虚拟图像资产与一个或多个软件包资产之间的关系数据的至少一部分。 关系数据的至少一部分被存储在存储器中。 确定一个或多个虚拟图像资产和一个或多个软件束资产中的至少一个与一组变化相关联。 识别与一个或多个虚拟图像资产相关的至少一个虚拟图像资产和/或与该组变更相关联的一个或多个软件包资产。 已经识别出的至少一个虚拟图像资产是基于该变化集来更新的。

    VIRTUAL SOLUTION COMPOSITION AND DEPLOYMENT SYSTEM AND METHOD
    10.
    发明申请
    VIRTUAL SOLUTION COMPOSITION AND DEPLOYMENT SYSTEM AND METHOD 失效
    虚拟解决方案组合和部署系统和方法

    公开(公告)号:US20100306772A1

    公开(公告)日:2010-12-02

    申请号:US12476006

    申请日:2009-06-01

    IPC分类号: G06F9/44

    CPC分类号: G06F8/36

    摘要: A method and information processing system are provided for creating a virtual part and for composing and deploying a virtual solution with one or more virtual parts. The virtual part includes: a virtual image including a set of compatible software components; a set of configurability points, each configurability point defining at least one parameter of the virtual part that is configurable; a set of virtual ports, wherein each virtual port indicates at least one of a set of virtual parts required by the virtual part and a set of virtual parts that are compatible with the virtual part; and a set of configuration scripts adapted to reconfigure the virtual image.

    摘要翻译: 提供了一种方法和信息处理系统,用于创建虚拟部分并用一个或多个虚拟部分组成和部署虚拟解决方案。 虚拟部分包括:包括一组兼容的软件组件的虚拟图像; 一组可配置点,每个可配置点定义可配置的虚拟部分的至少一个参数; 一组虚拟端口,其中每个虚拟端口指示虚拟部分所需的一组虚拟部分和与虚拟部分兼容的一组虚拟部分中的至少一个; 以及一组适用于重新配置虚拟映像的配置脚本。